| // SPDX-License-Identifier: GPL-2.0-or-later | 
 | /* | 
 |  * Bridge multicast support. | 
 |  * | 
 |  * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> | 
 |  */ | 
 |  | 
 | #include <linux/err.h> | 
 | #include <linux/export.h> | 
 | #include <linux/if_ether.h> | 
 | #include <linux/igmp.h> | 
 | #include <linux/in.h> | 
 | #include <linux/jhash.h> | 
 | #include <linux/kernel.h> | 
 | #include <linux/log2.h> | 
 | #include <linux/netdevice.h> | 
 | #include <linux/netfilter_bridge.h> | 
 | #include <linux/random.h> | 
 | #include <linux/rculist.h> | 
 | #include <linux/skbuff.h> | 
 | #include <linux/slab.h> | 
 | #include <linux/timer.h> | 
 | #include <linux/inetdevice.h> | 
 | #include <linux/mroute.h> | 
 | #include <net/ip.h> | 
 | #include <net/switchdev.h> | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | #include <linux/icmpv6.h> | 
 | #include <net/ipv6.h> | 
 | #include <net/mld.h> | 
 | #include <net/ip6_checksum.h> | 
 | #include <net/addrconf.h> | 
 | #endif | 
 | #include <trace/events/bridge.h> | 
 |  | 
 | #include "br_private.h" | 
 | #include "br_private_mcast_eht.h" | 
 |  | 
 | static const struct rhashtable_params br_mdb_rht_params = { | 
 | 	.head_offset = offsetof(struct net_bridge_mdb_entry, rhnode), | 
 | 	.key_offset = offsetof(struct net_bridge_mdb_entry, addr), | 
 | 	.key_len = sizeof(struct br_ip), | 
 | 	.automatic_shrinking = true, | 
 | }; | 
 |  | 
 | static const struct rhashtable_params br_sg_port_rht_params = { | 
 | 	.head_offset = offsetof(struct net_bridge_port_group, rhnode), | 
 | 	.key_offset = offsetof(struct net_bridge_port_group, key), | 
 | 	.key_len = sizeof(struct net_bridge_port_group_sg_key), | 
 | 	.automatic_shrinking = true, | 
 | }; | 
 |  | 
 | static void br_multicast_start_querier(struct net_bridge_mcast *brmctx, | 
 | 				       struct bridge_mcast_own_query *query); | 
 | static void br_ip4_multicast_add_router(struct net_bridge_mcast *brmctx, | 
 | 					struct net_bridge_mcast_port *pmctx); | 
 | static void br_ip4_multicast_leave_group(struct net_bridge_mcast *brmctx, | 
 | 					 struct net_bridge_mcast_port *pmctx, | 
 | 					 __be32 group, | 
 | 					 __u16 vid, | 
 | 					 const unsigned char *src); | 
 | static void br_multicast_port_group_rexmit(struct timer_list *t); | 
 |  | 
 | static void | 
 | br_multicast_rport_del_notify(struct net_bridge_mcast_port *pmctx, bool deleted); | 
 | static void br_ip6_multicast_add_router(struct net_bridge_mcast *brmctx, | 
 | 					struct net_bridge_mcast_port *pmctx); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_leave_group(struct net_bridge_mcast *brmctx, | 
 | 					 struct net_bridge_mcast_port *pmctx, | 
 | 					 const struct in6_addr *group, | 
 | 					 __u16 vid, const unsigned char *src); | 
 | #endif | 
 | static struct net_bridge_port_group * | 
 | __br_multicast_add_group(struct net_bridge_mcast *brmctx, | 
 | 			 struct net_bridge_mcast_port *pmctx, | 
 | 			 struct br_ip *group, | 
 | 			 const unsigned char *src, | 
 | 			 u8 filter_mode, | 
 | 			 bool igmpv2_mldv1, | 
 | 			 bool blocked); | 
 | static void br_multicast_find_del_pg(struct net_bridge *br, | 
 | 				     struct net_bridge_port_group *pg); | 
 | static void __br_multicast_stop(struct net_bridge_mcast *brmctx); | 
 |  | 
 | static int br_mc_disabled_update(struct net_device *dev, bool value, | 
 | 				 struct netlink_ext_ack *extack); | 
 |  | 
 | static struct net_bridge_port_group * | 
 | br_sg_port_find(struct net_bridge *br, | 
 | 		struct net_bridge_port_group_sg_key *sg_p) | 
 | { | 
 | 	lockdep_assert_held_once(&br->multicast_lock); | 
 |  | 
 | 	return rhashtable_lookup_fast(&br->sg_port_tbl, sg_p, | 
 | 				      br_sg_port_rht_params); | 
 | } | 
 |  | 
 | static struct net_bridge_mdb_entry *br_mdb_ip_get_rcu(struct net_bridge *br, | 
 | 						      struct br_ip *dst) | 
 | { | 
 | 	return rhashtable_lookup(&br->mdb_hash_tbl, dst, br_mdb_rht_params); | 
 | } | 
 |  | 
 | struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge *br, | 
 | 					   struct br_ip *dst) | 
 | { | 
 | 	struct net_bridge_mdb_entry *ent; | 
 |  | 
 | 	lockdep_assert_held_once(&br->multicast_lock); | 
 |  | 
 | 	rcu_read_lock(); | 
 | 	ent = rhashtable_lookup(&br->mdb_hash_tbl, dst, br_mdb_rht_params); | 
 | 	rcu_read_unlock(); | 
 |  | 
 | 	return ent; | 
 | } | 
 |  | 
 | static struct net_bridge_mdb_entry *br_mdb_ip4_get(struct net_bridge *br, | 
 | 						   __be32 dst, __u16 vid) | 
 | { | 
 | 	struct br_ip br_dst; | 
 |  | 
 | 	memset(&br_dst, 0, sizeof(br_dst)); | 
 | 	br_dst.dst.ip4 = dst; | 
 | 	br_dst.proto = htons(ETH_P_IP); | 
 | 	br_dst.vid = vid; | 
 |  | 
 | 	return br_mdb_ip_get(br, &br_dst); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static struct net_bridge_mdb_entry *br_mdb_ip6_get(struct net_bridge *br, | 
 | 						   const struct in6_addr *dst, | 
 | 						   __u16 vid) | 
 | { | 
 | 	struct br_ip br_dst; | 
 |  | 
 | 	memset(&br_dst, 0, sizeof(br_dst)); | 
 | 	br_dst.dst.ip6 = *dst; | 
 | 	br_dst.proto = htons(ETH_P_IPV6); | 
 | 	br_dst.vid = vid; | 
 |  | 
 | 	return br_mdb_ip_get(br, &br_dst); | 
 | } | 
 | #endif | 
 |  | 
 | struct net_bridge_mdb_entry * | 
 | br_mdb_entry_skb_get(struct net_bridge_mcast *brmctx, struct sk_buff *skb, | 
 | 		     u16 vid) | 
 | { | 
 | 	struct net_bridge *br = brmctx->br; | 
 | 	struct br_ip ip; | 
 |  | 
 | 	if (!br_opt_get(br, BROPT_MULTICAST_ENABLED) || | 
 | 	    br_multicast_ctx_vlan_global_disabled(brmctx)) | 
 | 		return NULL; | 
 |  | 
 | 	if (BR_INPUT_SKB_CB(skb)->igmp) | 
 | 		return NULL; | 
 |  | 
 | 	memset(&ip, 0, sizeof(ip)); | 
 | 	ip.proto = skb->protocol; | 
 | 	ip.vid = vid; | 
 |  | 
 | 	switch (skb->protocol) { | 
 | 	case htons(ETH_P_IP): | 
 | 		ip.dst.ip4 = ip_hdr(skb)->daddr; | 
 | 		if (brmctx->multicast_igmp_version == 3) { | 
 | 			struct net_bridge_mdb_entry *mdb; | 
 |  | 
 | 			ip.src.ip4 = ip_hdr(skb)->saddr; | 
 | 			mdb = br_mdb_ip_get_rcu(br, &ip); | 
 | 			if (mdb) | 
 | 				return mdb; | 
 | 			ip.src.ip4 = 0; | 
 | 		} | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case htons(ETH_P_IPV6): | 
 | 		ip.dst.ip6 = ipv6_hdr(skb)->daddr; | 
 | 		if (brmctx->multicast_mld_version == 2) { | 
 | 			struct net_bridge_mdb_entry *mdb; | 
 |  | 
 | 			ip.src.ip6 = ipv6_hdr(skb)->saddr; | 
 | 			mdb = br_mdb_ip_get_rcu(br, &ip); | 
 | 			if (mdb) | 
 | 				return mdb; | 
 | 			memset(&ip.src.ip6, 0, sizeof(ip.src.ip6)); | 
 | 		} | 
 | 		break; | 
 | #endif | 
 | 	default: | 
 | 		ip.proto = 0; | 
 | 		ether_addr_copy(ip.dst.mac_addr, eth_hdr(skb)->h_dest); | 
 | 	} | 
 |  | 
 | 	return br_mdb_ip_get_rcu(br, &ip); | 
 | } | 
 |  | 
 | /* IMPORTANT: this function must be used only when the contexts cannot be | 
 |  * passed down (e.g. timer) and must be used for read-only purposes because | 
 |  * the vlan snooping option can change, so it can return any context | 
 |  * (non-vlan or vlan). Its initial intended purpose is to read timer values | 
 |  * from the *current* context based on the option. At worst that could lead | 
 |  * to inconsistent timers when the contexts are changed, i.e. src timer | 
 |  * which needs to re-arm with a specific delay taken from the old context | 
 |  */ | 
 | static struct net_bridge_mcast_port * | 
 | br_multicast_pg_to_port_ctx(const struct net_bridge_port_group *pg) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx = &pg->key.port->multicast_ctx; | 
 | 	struct net_bridge_vlan *vlan; | 
 |  | 
 | 	lockdep_assert_held_once(&pg->key.port->br->multicast_lock); | 
 |  | 
 | 	/* if vlan snooping is disabled use the port's multicast context */ | 
 | 	if (!pg->key.addr.vid || | 
 | 	    !br_opt_get(pg->key.port->br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) | 
 | 		goto out; | 
 |  | 
 | 	/* locking is tricky here, due to different rules for multicast and | 
 | 	 * vlans we need to take rcu to find the vlan and make sure it has | 
 | 	 * the BR_VLFLAG_MCAST_ENABLED flag set, it can only change under | 
 | 	 * multicast_lock which must be already held here, so the vlan's pmctx | 
 | 	 * can safely be used on return | 
 | 	 */ | 
 | 	rcu_read_lock(); | 
 | 	vlan = br_vlan_find(nbp_vlan_group_rcu(pg->key.port), pg->key.addr.vid); | 
 | 	if (vlan && !br_multicast_port_ctx_vlan_disabled(&vlan->port_mcast_ctx)) | 
 | 		pmctx = &vlan->port_mcast_ctx; | 
 | 	else | 
 | 		pmctx = NULL; | 
 | 	rcu_read_unlock(); | 
 | out: | 
 | 	return pmctx; | 
 | } | 
 |  | 
 | static struct net_bridge_mcast_port * | 
 | br_multicast_port_vid_to_port_ctx(struct net_bridge_port *port, u16 vid) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx = NULL; | 
 | 	struct net_bridge_vlan *vlan; | 
 |  | 
 | 	lockdep_assert_held_once(&port->br->multicast_lock); | 
 |  | 
 | 	if (!br_opt_get(port->br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) | 
 | 		return NULL; | 
 |  | 
 | 	/* Take RCU to access the vlan. */ | 
 | 	rcu_read_lock(); | 
 |  | 
 | 	vlan = br_vlan_find(nbp_vlan_group_rcu(port), vid); | 
 | 	if (vlan && !br_multicast_port_ctx_vlan_disabled(&vlan->port_mcast_ctx)) | 
 | 		pmctx = &vlan->port_mcast_ctx; | 
 |  | 
 | 	rcu_read_unlock(); | 
 |  | 
 | 	return pmctx; | 
 | } | 
 |  | 
 | /* when snooping we need to check if the contexts should be used | 
 |  * in the following order: | 
 |  * - if pmctx is non-NULL (port), check if it should be used | 
 |  * - if pmctx is NULL (bridge), check if brmctx should be used | 
 |  */ | 
 | static bool | 
 | br_multicast_ctx_should_use(const struct net_bridge_mcast *brmctx, | 
 | 			    const struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	if (!netif_running(brmctx->br->dev)) | 
 | 		return false; | 
 |  | 
 | 	if (pmctx) | 
 | 		return !br_multicast_port_ctx_state_disabled(pmctx); | 
 | 	else | 
 | 		return !br_multicast_ctx_vlan_disabled(brmctx); | 
 | } | 
 |  | 
 | static bool br_port_group_equal(struct net_bridge_port_group *p, | 
 | 				struct net_bridge_port *port, | 
 | 				const unsigned char *src) | 
 | { | 
 | 	if (p->key.port != port) | 
 | 		return false; | 
 |  | 
 | 	if (!(port->flags & BR_MULTICAST_TO_UNICAST)) | 
 | 		return true; | 
 |  | 
 | 	return ether_addr_equal(src, p->eth_addr); | 
 | } | 
 |  | 
 | static void __fwd_add_star_excl(struct net_bridge_mcast_port *pmctx, | 
 | 				struct net_bridge_port_group *pg, | 
 | 				struct br_ip *sg_ip) | 
 | { | 
 | 	struct net_bridge_port_group_sg_key sg_key; | 
 | 	struct net_bridge_port_group *src_pg; | 
 | 	struct net_bridge_mcast *brmctx; | 
 |  | 
 | 	memset(&sg_key, 0, sizeof(sg_key)); | 
 | 	brmctx = br_multicast_port_ctx_get_global(pmctx); | 
 | 	sg_key.port = pg->key.port; | 
 | 	sg_key.addr = *sg_ip; | 
 | 	if (br_sg_port_find(brmctx->br, &sg_key)) | 
 | 		return; | 
 |  | 
 | 	src_pg = __br_multicast_add_group(brmctx, pmctx, | 
 | 					  sg_ip, pg->eth_addr, | 
 | 					  MCAST_INCLUDE, false, false); | 
 | 	if (IS_ERR_OR_NULL(src_pg) || | 
 | 	    src_pg->rt_protocol != RTPROT_KERNEL) | 
 | 		return; | 
 |  | 
 | 	src_pg->flags |= MDB_PG_FLAGS_STAR_EXCL; | 
 | } | 
 |  | 
 | static void __fwd_del_star_excl(struct net_bridge_port_group *pg, | 
 | 				struct br_ip *sg_ip) | 
 | { | 
 | 	struct net_bridge_port_group_sg_key sg_key; | 
 | 	struct net_bridge *br = pg->key.port->br; | 
 | 	struct net_bridge_port_group *src_pg; | 
 |  | 
 | 	memset(&sg_key, 0, sizeof(sg_key)); | 
 | 	sg_key.port = pg->key.port; | 
 | 	sg_key.addr = *sg_ip; | 
 | 	src_pg = br_sg_port_find(br, &sg_key); | 
 | 	if (!src_pg || !(src_pg->flags & MDB_PG_FLAGS_STAR_EXCL) || | 
 | 	    src_pg->rt_protocol != RTPROT_KERNEL) | 
 | 		return; | 
 |  | 
 | 	br_multicast_find_del_pg(br, src_pg); | 
 | } | 
 |  | 
 | /* When a port group transitions to (or is added as) EXCLUDE we need to add it | 
 |  * to all other ports' S,G entries which are not blocked by the current group | 
 |  * for proper replication, the assumption is that any S,G blocked entries | 
 |  * are already added so the S,G,port lookup should skip them. | 
 |  * When a port group transitions from EXCLUDE -> INCLUDE mode or is being | 
 |  * deleted we need to remove it from all ports' S,G entries where it was | 
 |  * automatically installed before (i.e. where it's MDB_PG_FLAGS_STAR_EXCL). | 
 |  */ | 
 | void br_multicast_star_g_handle_mode(struct net_bridge_port_group *pg, | 
 | 				     u8 filter_mode) | 
 | { | 
 | 	struct net_bridge *br = pg->key.port->br; | 
 | 	struct net_bridge_port_group *pg_lst; | 
 | 	struct net_bridge_mcast_port *pmctx; | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	struct br_ip sg_ip; | 
 |  | 
 | 	if (WARN_ON(!br_multicast_is_star_g(&pg->key.addr))) | 
 | 		return; | 
 |  | 
 | 	mp = br_mdb_ip_get(br, &pg->key.addr); | 
 | 	if (!mp) | 
 | 		return; | 
 | 	pmctx = br_multicast_pg_to_port_ctx(pg); | 
 | 	if (!pmctx) | 
 | 		return; | 
 |  | 
 | 	memset(&sg_ip, 0, sizeof(sg_ip)); | 
 | 	sg_ip = pg->key.addr; | 
 |  | 
 | 	for (pg_lst = mlock_dereference(mp->ports, br); | 
 | 	     pg_lst; | 
 | 	     pg_lst = mlock_dereference(pg_lst->next, br)) { | 
 | 		struct net_bridge_group_src *src_ent; | 
 |  | 
 | 		if (pg_lst == pg) | 
 | 			continue; | 
 | 		hlist_for_each_entry(src_ent, &pg_lst->src_list, node) { | 
 | 			if (!(src_ent->flags & BR_SGRP_F_INSTALLED)) | 
 | 				continue; | 
 | 			sg_ip.src = src_ent->addr.src; | 
 | 			switch (filter_mode) { | 
 | 			case MCAST_INCLUDE: | 
 | 				__fwd_del_star_excl(pg, &sg_ip); | 
 | 				break; | 
 | 			case MCAST_EXCLUDE: | 
 | 				__fwd_add_star_excl(pmctx, pg, &sg_ip); | 
 | 				break; | 
 | 			} | 
 | 		} | 
 | 	} | 
 | } | 
 |  | 
 | /* called when adding a new S,G with host_joined == false by default */ | 
 | static void br_multicast_sg_host_state(struct net_bridge_mdb_entry *star_mp, | 
 | 				       struct net_bridge_port_group *sg) | 
 | { | 
 | 	struct net_bridge_mdb_entry *sg_mp; | 
 |  | 
 | 	if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr))) | 
 | 		return; | 
 | 	if (!star_mp->host_joined) | 
 | 		return; | 
 |  | 
 | 	sg_mp = br_mdb_ip_get(star_mp->br, &sg->key.addr); | 
 | 	if (!sg_mp) | 
 | 		return; | 
 | 	sg_mp->host_joined = true; | 
 | } | 
 |  | 
 | /* set the host_joined state of all of *,G's S,G entries */ | 
 | static void br_multicast_star_g_host_state(struct net_bridge_mdb_entry *star_mp) | 
 | { | 
 | 	struct net_bridge *br = star_mp->br; | 
 | 	struct net_bridge_mdb_entry *sg_mp; | 
 | 	struct net_bridge_port_group *pg; | 
 | 	struct br_ip sg_ip; | 
 |  | 
 | 	if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr))) | 
 | 		return; | 
 |  | 
 | 	memset(&sg_ip, 0, sizeof(sg_ip)); | 
 | 	sg_ip = star_mp->addr; | 
 | 	for (pg = mlock_dereference(star_mp->ports, br); | 
 | 	     pg; | 
 | 	     pg = mlock_dereference(pg->next, br)) { | 
 | 		struct net_bridge_group_src *src_ent; | 
 |  | 
 | 		hlist_for_each_entry(src_ent, &pg->src_list, node) { | 
 | 			if (!(src_ent->flags & BR_SGRP_F_INSTALLED)) | 
 | 				continue; | 
 | 			sg_ip.src = src_ent->addr.src; | 
 | 			sg_mp = br_mdb_ip_get(br, &sg_ip); | 
 | 			if (!sg_mp) | 
 | 				continue; | 
 | 			sg_mp->host_joined = star_mp->host_joined; | 
 | 		} | 
 | 	} | 
 | } | 
 |  | 
 | static void br_multicast_sg_del_exclude_ports(struct net_bridge_mdb_entry *sgmp) | 
 | { | 
 | 	struct net_bridge_port_group __rcu **pp; | 
 | 	struct net_bridge_port_group *p; | 
 |  | 
 | 	/* *,G exclude ports are only added to S,G entries */ | 
 | 	if (WARN_ON(br_multicast_is_star_g(&sgmp->addr))) | 
 | 		return; | 
 |  | 
 | 	/* we need the STAR_EXCLUDE ports if there are non-STAR_EXCLUDE ports | 
 | 	 * we should ignore perm entries since they're managed by user-space | 
 | 	 */ | 
 | 	for (pp = &sgmp->ports; | 
 | 	     (p = mlock_dereference(*pp, sgmp->br)) != NULL; | 
 | 	     pp = &p->next) | 
 | 		if (!(p->flags & (MDB_PG_FLAGS_STAR_EXCL | | 
 | 				  MDB_PG_FLAGS_PERMANENT))) | 
 | 			return; | 
 |  | 
 | 	/* currently the host can only have joined the *,G which means | 
 | 	 * we treat it as EXCLUDE {}, so for an S,G it's considered a | 
 | 	 * STAR_EXCLUDE entry and we can safely leave it | 
 | 	 */ | 
 | 	sgmp->host_joined = false; | 
 |  | 
 | 	for (pp = &sgmp->ports; | 
 | 	     (p = mlock_dereference(*pp, sgmp->br)) != NULL;) { | 
 | 		if (!(p->flags & MDB_PG_FLAGS_PERMANENT)) | 
 | 			br_multicast_del_pg(sgmp, p, pp); | 
 | 		else | 
 | 			pp = &p->next; | 
 | 	} | 
 | } | 
 |  | 
 | void br_multicast_sg_add_exclude_ports(struct net_bridge_mdb_entry *star_mp, | 
 | 				       struct net_bridge_port_group *sg) | 
 | { | 
 | 	struct net_bridge_port_group_sg_key sg_key; | 
 | 	struct net_bridge *br = star_mp->br; | 
 | 	struct net_bridge_mcast_port *pmctx; | 
 | 	struct net_bridge_port_group *pg; | 
 | 	struct net_bridge_mcast *brmctx; | 
 |  | 
 | 	if (WARN_ON(br_multicast_is_star_g(&sg->key.addr))) | 
 | 		return; | 
 | 	if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr))) | 
 | 		return; | 
 |  | 
 | 	br_multicast_sg_host_state(star_mp, sg); | 
 | 	memset(&sg_key, 0, sizeof(sg_key)); | 
 | 	sg_key.addr = sg->key.addr; | 
 | 	/* we need to add all exclude ports to the S,G */ | 
 | 	for (pg = mlock_dereference(star_mp->ports, br); | 
 | 	     pg; | 
 | 	     pg = mlock_dereference(pg->next, br)) { | 
 | 		struct net_bridge_port_group *src_pg; | 
 |  | 
 | 		if (pg == sg || pg->filter_mode == MCAST_INCLUDE) | 
 | 			continue; | 
 |  | 
 | 		sg_key.port = pg->key.port; | 
 | 		if (br_sg_port_find(br, &sg_key)) | 
 | 			continue; | 
 |  | 
 | 		pmctx = br_multicast_pg_to_port_ctx(pg); | 
 | 		if (!pmctx) | 
 | 			continue; | 
 | 		brmctx = br_multicast_port_ctx_get_global(pmctx); | 
 |  | 
 | 		src_pg = __br_multicast_add_group(brmctx, pmctx, | 
 | 						  &sg->key.addr, | 
 | 						  sg->eth_addr, | 
 | 						  MCAST_INCLUDE, false, false); | 
 | 		if (IS_ERR_OR_NULL(src_pg) || | 
 | 		    src_pg->rt_protocol != RTPROT_KERNEL) | 
 | 			continue; | 
 | 		src_pg->flags |= MDB_PG_FLAGS_STAR_EXCL; | 
 | 	} | 
 | } | 
 |  | 
 | static void br_multicast_fwd_src_add(struct net_bridge_group_src *src) | 
 | { | 
 | 	struct net_bridge_mdb_entry *star_mp; | 
 | 	struct net_bridge_mcast_port *pmctx; | 
 | 	struct net_bridge_port_group *sg; | 
 | 	struct net_bridge_mcast *brmctx; | 
 | 	struct br_ip sg_ip; | 
 |  | 
 | 	if (src->flags & BR_SGRP_F_INSTALLED) | 
 | 		return; | 
 |  | 
 | 	memset(&sg_ip, 0, sizeof(sg_ip)); | 
 | 	pmctx = br_multicast_pg_to_port_ctx(src->pg); | 
 | 	if (!pmctx) | 
 | 		return; | 
 | 	brmctx = br_multicast_port_ctx_get_global(pmctx); | 
 | 	sg_ip = src->pg->key.addr; | 
 | 	sg_ip.src = src->addr.src; | 
 |  | 
 | 	sg = __br_multicast_add_group(brmctx, pmctx, &sg_ip, | 
 | 				      src->pg->eth_addr, MCAST_INCLUDE, false, | 
 | 				      !timer_pending(&src->timer)); | 
 | 	if (IS_ERR_OR_NULL(sg)) | 
 | 		return; | 
 | 	src->flags |= BR_SGRP_F_INSTALLED; | 
 | 	sg->flags &= ~MDB_PG_FLAGS_STAR_EXCL; | 
 |  | 
 | 	/* if it was added by user-space as perm we can skip next steps */ | 
 | 	if (sg->rt_protocol != RTPROT_KERNEL && | 
 | 	    (sg->flags & MDB_PG_FLAGS_PERMANENT)) | 
 | 		return; | 
 |  | 
 | 	/* the kernel is now responsible for removing this S,G */ | 
 | 	timer_delete(&sg->timer); | 
 | 	star_mp = br_mdb_ip_get(src->br, &src->pg->key.addr); | 
 | 	if (!star_mp) | 
 | 		return; | 
 |  | 
 | 	br_multicast_sg_add_exclude_ports(star_mp, sg); | 
 | } | 
 |  | 
 | static void br_multicast_fwd_src_remove(struct net_bridge_group_src *src, | 
 | 					bool fastleave) | 
 | { | 
 | 	struct net_bridge_port_group *p, *pg = src->pg; | 
 | 	struct net_bridge_port_group __rcu **pp; | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	struct br_ip sg_ip; | 
 |  | 
 | 	memset(&sg_ip, 0, sizeof(sg_ip)); | 
 | 	sg_ip = pg->key.addr; | 
 | 	sg_ip.src = src->addr.src; | 
 |  | 
 | 	mp = br_mdb_ip_get(src->br, &sg_ip); | 
 | 	if (!mp) | 
 | 		return; | 
 |  | 
 | 	for (pp = &mp->ports; | 
 | 	     (p = mlock_dereference(*pp, src->br)) != NULL; | 
 | 	     pp = &p->next) { | 
 | 		if (!br_port_group_equal(p, pg->key.port, pg->eth_addr)) | 
 | 			continue; | 
 |  | 
 | 		if (p->rt_protocol != RTPROT_KERNEL && | 
 | 		    (p->flags & MDB_PG_FLAGS_PERMANENT) && | 
 | 		    !(src->flags & BR_SGRP_F_USER_ADDED)) | 
 | 			break; | 
 |  | 
 | 		if (fastleave) | 
 | 			p->flags |= MDB_PG_FLAGS_FAST_LEAVE; | 
 | 		br_multicast_del_pg(mp, p, pp); | 
 | 		break; | 
 | 	} | 
 | 	src->flags &= ~BR_SGRP_F_INSTALLED; | 
 | } | 
 |  | 
 | /* install S,G and based on src's timer enable or disable forwarding */ | 
 | static void br_multicast_fwd_src_handle(struct net_bridge_group_src *src) | 
 | { | 
 | 	struct net_bridge_port_group_sg_key sg_key; | 
 | 	struct net_bridge_port_group *sg; | 
 | 	u8 old_flags; | 
 |  | 
 | 	br_multicast_fwd_src_add(src); | 
 |  | 
 | 	memset(&sg_key, 0, sizeof(sg_key)); | 
 | 	sg_key.addr = src->pg->key.addr; | 
 | 	sg_key.addr.src = src->addr.src; | 
 | 	sg_key.port = src->pg->key.port; | 
 |  | 
 | 	sg = br_sg_port_find(src->br, &sg_key); | 
 | 	if (!sg || (sg->flags & MDB_PG_FLAGS_PERMANENT)) | 
 | 		return; | 
 |  | 
 | 	old_flags = sg->flags; | 
 | 	if (timer_pending(&src->timer)) | 
 | 		sg->flags &= ~MDB_PG_FLAGS_BLOCKED; | 
 | 	else | 
 | 		sg->flags |= MDB_PG_FLAGS_BLOCKED; | 
 |  | 
 | 	if (old_flags != sg->flags) { | 
 | 		struct net_bridge_mdb_entry *sg_mp; | 
 |  | 
 | 		sg_mp = br_mdb_ip_get(src->br, &sg_key.addr); | 
 | 		if (!sg_mp) | 
 | 			return; | 
 | 		br_mdb_notify(src->br->dev, sg_mp, sg, RTM_NEWMDB); | 
 | 	} | 
 | } | 
 |  | 
 | static void br_multicast_destroy_mdb_entry(struct net_bridge_mcast_gc *gc) | 
 | { | 
 | 	struct net_bridge_mdb_entry *mp; | 
 |  | 
 | 	mp = container_of(gc, struct net_bridge_mdb_entry, mcast_gc); | 
 | 	WARN_ON(!hlist_unhashed(&mp->mdb_node)); | 
 | 	WARN_ON(mp->ports); | 
 |  | 
 | 	timer_shutdown_sync(&mp->timer); | 
 | 	kfree_rcu(mp, rcu); | 
 | } | 
 |  | 
 | static void br_multicast_del_mdb_entry(struct net_bridge_mdb_entry *mp) | 
 | { | 
 | 	struct net_bridge *br = mp->br; | 
 |  | 
 | 	rhashtable_remove_fast(&br->mdb_hash_tbl, &mp->rhnode, | 
 | 			       br_mdb_rht_params); | 
 | 	hlist_del_init_rcu(&mp->mdb_node); | 
 | 	hlist_add_head(&mp->mcast_gc.gc_node, &br->mcast_gc_list); | 
 | 	queue_work(system_long_wq, &br->mcast_gc_work); | 
 | } | 
 |  | 
 | static void br_multicast_group_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mdb_entry *mp = timer_container_of(mp, t, timer); | 
 | 	struct net_bridge *br = mp->br; | 
 |  | 
 | 	spin_lock(&br->multicast_lock); | 
 | 	if (hlist_unhashed(&mp->mdb_node) || !netif_running(br->dev) || | 
 | 	    timer_pending(&mp->timer)) | 
 | 		goto out; | 
 |  | 
 | 	br_multicast_host_leave(mp, true); | 
 |  | 
 | 	if (mp->ports) | 
 | 		goto out; | 
 | 	br_multicast_del_mdb_entry(mp); | 
 | out: | 
 | 	spin_unlock(&br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_multicast_destroy_group_src(struct net_bridge_mcast_gc *gc) | 
 | { | 
 | 	struct net_bridge_group_src *src; | 
 |  | 
 | 	src = container_of(gc, struct net_bridge_group_src, mcast_gc); | 
 | 	WARN_ON(!hlist_unhashed(&src->node)); | 
 |  | 
 | 	timer_shutdown_sync(&src->timer); | 
 | 	kfree_rcu(src, rcu); | 
 | } | 
 |  | 
 | void __br_multicast_del_group_src(struct net_bridge_group_src *src) | 
 | { | 
 | 	struct net_bridge *br = src->pg->key.port->br; | 
 |  | 
 | 	hlist_del_init_rcu(&src->node); | 
 | 	src->pg->src_ents--; | 
 | 	hlist_add_head(&src->mcast_gc.gc_node, &br->mcast_gc_list); | 
 | 	queue_work(system_long_wq, &br->mcast_gc_work); | 
 | } | 
 |  | 
 | void br_multicast_del_group_src(struct net_bridge_group_src *src, | 
 | 				bool fastleave) | 
 | { | 
 | 	br_multicast_fwd_src_remove(src, fastleave); | 
 | 	__br_multicast_del_group_src(src); | 
 | } | 
 |  | 
 | static int | 
 | br_multicast_port_ngroups_inc_one(struct net_bridge_mcast_port *pmctx, | 
 | 				  struct netlink_ext_ack *extack, | 
 | 				  const char *what) | 
 | { | 
 | 	u32 max = READ_ONCE(pmctx->mdb_max_entries); | 
 | 	u32 n = READ_ONCE(pmctx->mdb_n_entries); | 
 |  | 
 | 	if (max && n >= max) { | 
 | 		NL_SET_ERR_MSG_FMT_MOD(extack, "%s is already in %u groups, and mcast_max_groups=%u", | 
 | 				       what, n, max); | 
 | 		return -E2BIG; | 
 | 	} | 
 |  | 
 | 	WRITE_ONCE(pmctx->mdb_n_entries, n + 1); | 
 | 	return 0; | 
 | } | 
 |  | 
 | static void br_multicast_port_ngroups_dec_one(struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	u32 n = READ_ONCE(pmctx->mdb_n_entries); | 
 |  | 
 | 	WARN_ON_ONCE(n == 0); | 
 | 	WRITE_ONCE(pmctx->mdb_n_entries, n - 1); | 
 | } | 
 |  | 
 | static int br_multicast_port_ngroups_inc(struct net_bridge_port *port, | 
 | 					 const struct br_ip *group, | 
 | 					 struct netlink_ext_ack *extack) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx; | 
 | 	int err; | 
 |  | 
 | 	lockdep_assert_held_once(&port->br->multicast_lock); | 
 |  | 
 | 	/* Always count on the port context. */ | 
 | 	err = br_multicast_port_ngroups_inc_one(&port->multicast_ctx, extack, | 
 | 						"Port"); | 
 | 	if (err) { | 
 | 		trace_br_mdb_full(port->dev, group); | 
 | 		return err; | 
 | 	} | 
 |  | 
 | 	/* Only count on the VLAN context if VID is given, and if snooping on | 
 | 	 * that VLAN is enabled. | 
 | 	 */ | 
 | 	if (!group->vid) | 
 | 		return 0; | 
 |  | 
 | 	pmctx = br_multicast_port_vid_to_port_ctx(port, group->vid); | 
 | 	if (!pmctx) | 
 | 		return 0; | 
 |  | 
 | 	err = br_multicast_port_ngroups_inc_one(pmctx, extack, "Port-VLAN"); | 
 | 	if (err) { | 
 | 		trace_br_mdb_full(port->dev, group); | 
 | 		goto dec_one_out; | 
 | 	} | 
 |  | 
 | 	return 0; | 
 |  | 
 | dec_one_out: | 
 | 	br_multicast_port_ngroups_dec_one(&port->multicast_ctx); | 
 | 	return err; | 
 | } | 
 |  | 
 | static void br_multicast_port_ngroups_dec(struct net_bridge_port *port, u16 vid) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx; | 
 |  | 
 | 	lockdep_assert_held_once(&port->br->multicast_lock); | 
 |  | 
 | 	if (vid) { | 
 | 		pmctx = br_multicast_port_vid_to_port_ctx(port, vid); | 
 | 		if (pmctx) | 
 | 			br_multicast_port_ngroups_dec_one(pmctx); | 
 | 	} | 
 | 	br_multicast_port_ngroups_dec_one(&port->multicast_ctx); | 
 | } | 
 |  | 
 | u32 br_multicast_ngroups_get(const struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	return READ_ONCE(pmctx->mdb_n_entries); | 
 | } | 
 |  | 
 | void br_multicast_ngroups_set_max(struct net_bridge_mcast_port *pmctx, u32 max) | 
 | { | 
 | 	WRITE_ONCE(pmctx->mdb_max_entries, max); | 
 | } | 
 |  | 
 | u32 br_multicast_ngroups_get_max(const struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	return READ_ONCE(pmctx->mdb_max_entries); | 
 | } | 
 |  | 
 | static void br_multicast_destroy_port_group(struct net_bridge_mcast_gc *gc) | 
 | { | 
 | 	struct net_bridge_port_group *pg; | 
 |  | 
 | 	pg = container_of(gc, struct net_bridge_port_group, mcast_gc); | 
 | 	WARN_ON(!hlist_unhashed(&pg->mglist)); | 
 | 	WARN_ON(!hlist_empty(&pg->src_list)); | 
 |  | 
 | 	timer_shutdown_sync(&pg->rexmit_timer); | 
 | 	timer_shutdown_sync(&pg->timer); | 
 | 	kfree_rcu(pg, rcu); | 
 | } | 
 |  | 
 | void br_multicast_del_pg(struct net_bridge_mdb_entry *mp, | 
 | 			 struct net_bridge_port_group *pg, | 
 | 			 struct net_bridge_port_group __rcu **pp) | 
 | { | 
 | 	struct net_bridge *br = pg->key.port->br; | 
 | 	struct net_bridge_group_src *ent; | 
 | 	struct hlist_node *tmp; | 
 |  | 
 | 	rcu_assign_pointer(*pp, pg->next); | 
 | 	hlist_del_init(&pg->mglist); | 
 | 	br_multicast_eht_clean_sets(pg); | 
 | 	hlist_for_each_entry_safe(ent, tmp, &pg->src_list, node) | 
 | 		br_multicast_del_group_src(ent, false); | 
 | 	br_mdb_notify(br->dev, mp, pg, RTM_DELMDB); | 
 | 	if (!br_multicast_is_star_g(&mp->addr)) { | 
 | 		rhashtable_remove_fast(&br->sg_port_tbl, &pg->rhnode, | 
 | 				       br_sg_port_rht_params); | 
 | 		br_multicast_sg_del_exclude_ports(mp); | 
 | 	} else { | 
 | 		br_multicast_star_g_handle_mode(pg, MCAST_INCLUDE); | 
 | 	} | 
 | 	br_multicast_port_ngroups_dec(pg->key.port, pg->key.addr.vid); | 
 | 	hlist_add_head(&pg->mcast_gc.gc_node, &br->mcast_gc_list); | 
 | 	queue_work(system_long_wq, &br->mcast_gc_work); | 
 |  | 
 | 	if (!mp->ports && !mp->host_joined && netif_running(br->dev)) | 
 | 		mod_timer(&mp->timer, jiffies); | 
 | } | 
 |  | 
 | static void br_multicast_find_del_pg(struct net_bridge *br, | 
 | 				     struct net_bridge_port_group *pg) | 
 | { | 
 | 	struct net_bridge_port_group __rcu **pp; | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	struct net_bridge_port_group *p; | 
 |  | 
 | 	mp = br_mdb_ip_get(br, &pg->key.addr); | 
 | 	if (WARN_ON(!mp)) | 
 | 		return; | 
 |  | 
 | 	for (pp = &mp->ports; | 
 | 	     (p = mlock_dereference(*pp, br)) != NULL; | 
 | 	     pp = &p->next) { | 
 | 		if (p != pg) | 
 | 			continue; | 
 |  | 
 | 		br_multicast_del_pg(mp, pg, pp); | 
 | 		return; | 
 | 	} | 
 |  | 
 | 	WARN_ON(1); | 
 | } | 
 |  | 
 | static void br_multicast_port_group_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_port_group *pg = timer_container_of(pg, t, timer); | 
 | 	struct net_bridge_group_src *src_ent; | 
 | 	struct net_bridge *br = pg->key.port->br; | 
 | 	struct hlist_node *tmp; | 
 | 	bool changed; | 
 |  | 
 | 	spin_lock(&br->multicast_lock); | 
 | 	if (!netif_running(br->dev) || timer_pending(&pg->timer) || | 
 | 	    hlist_unhashed(&pg->mglist) || pg->flags & MDB_PG_FLAGS_PERMANENT) | 
 | 		goto out; | 
 |  | 
 | 	changed = !!(pg->filter_mode == MCAST_EXCLUDE); | 
 | 	pg->filter_mode = MCAST_INCLUDE; | 
 | 	hlist_for_each_entry_safe(src_ent, tmp, &pg->src_list, node) { | 
 | 		if (!timer_pending(&src_ent->timer)) { | 
 | 			br_multicast_del_group_src(src_ent, false); | 
 | 			changed = true; | 
 | 		} | 
 | 	} | 
 |  | 
 | 	if (hlist_empty(&pg->src_list)) { | 
 | 		br_multicast_find_del_pg(br, pg); | 
 | 	} else if (changed) { | 
 | 		struct net_bridge_mdb_entry *mp = br_mdb_ip_get(br, &pg->key.addr); | 
 |  | 
 | 		if (changed && br_multicast_is_star_g(&pg->key.addr)) | 
 | 			br_multicast_star_g_handle_mode(pg, MCAST_INCLUDE); | 
 |  | 
 | 		if (WARN_ON(!mp)) | 
 | 			goto out; | 
 | 		br_mdb_notify(br->dev, mp, pg, RTM_NEWMDB); | 
 | 	} | 
 | out: | 
 | 	spin_unlock(&br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_multicast_gc(struct hlist_head *head) | 
 | { | 
 | 	struct net_bridge_mcast_gc *gcent; | 
 | 	struct hlist_node *tmp; | 
 |  | 
 | 	hlist_for_each_entry_safe(gcent, tmp, head, gc_node) { | 
 | 		hlist_del_init(&gcent->gc_node); | 
 | 		gcent->destroy(gcent); | 
 | 	} | 
 | } | 
 |  | 
 | static void __br_multicast_query_handle_vlan(struct net_bridge_mcast *brmctx, | 
 | 					     struct net_bridge_mcast_port *pmctx, | 
 | 					     struct sk_buff *skb) | 
 | { | 
 | 	struct net_bridge_vlan *vlan = NULL; | 
 |  | 
 | 	if (pmctx && br_multicast_port_ctx_is_vlan(pmctx)) | 
 | 		vlan = pmctx->vlan; | 
 | 	else if (br_multicast_ctx_is_vlan(brmctx)) | 
 | 		vlan = brmctx->vlan; | 
 |  | 
 | 	if (vlan && !(vlan->flags & BRIDGE_VLAN_INFO_UNTAGGED)) { | 
 | 		u16 vlan_proto; | 
 |  | 
 | 		if (br_vlan_get_proto(brmctx->br->dev, &vlan_proto) != 0) | 
 | 			return; | 
 | 		__vlan_hwaccel_put_tag(skb, htons(vlan_proto), vlan->vid); | 
 | 	} | 
 | } | 
 |  | 
 | static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge_mcast *brmctx, | 
 | 						    struct net_bridge_mcast_port *pmctx, | 
 | 						    struct net_bridge_port_group *pg, | 
 | 						    __be32 ip_dst, __be32 group, | 
 | 						    bool with_srcs, bool over_lmqt, | 
 | 						    u8 sflag, u8 *igmp_type, | 
 | 						    bool *need_rexmit) | 
 | { | 
 | 	struct net_bridge_port *p = pg ? pg->key.port : NULL; | 
 | 	struct net_bridge_group_src *ent; | 
 | 	size_t pkt_size, igmp_hdr_size; | 
 | 	unsigned long now = jiffies; | 
 | 	struct igmpv3_query *ihv3; | 
 | 	void *csum_start = NULL; | 
 | 	__sum16 *csum = NULL; | 
 | 	struct sk_buff *skb; | 
 | 	struct igmphdr *ih; | 
 | 	struct ethhdr *eth; | 
 | 	unsigned long lmqt; | 
 | 	struct iphdr *iph; | 
 | 	u16 lmqt_srcs = 0; | 
 |  | 
 | 	igmp_hdr_size = sizeof(*ih); | 
 | 	if (brmctx->multicast_igmp_version == 3) { | 
 | 		igmp_hdr_size = sizeof(*ihv3); | 
 | 		if (pg && with_srcs) { | 
 | 			lmqt = now + (brmctx->multicast_last_member_interval * | 
 | 				      brmctx->multicast_last_member_count); | 
 | 			hlist_for_each_entry(ent, &pg->src_list, node) { | 
 | 				if (over_lmqt == time_after(ent->timer.expires, | 
 | 							    lmqt) && | 
 | 				    ent->src_query_rexmit_cnt > 0) | 
 | 					lmqt_srcs++; | 
 | 			} | 
 |  | 
 | 			if (!lmqt_srcs) | 
 | 				return NULL; | 
 | 			igmp_hdr_size += lmqt_srcs * sizeof(__be32); | 
 | 		} | 
 | 	} | 
 |  | 
 | 	pkt_size = sizeof(*eth) + sizeof(*iph) + 4 + igmp_hdr_size; | 
 | 	if ((p && pkt_size > p->dev->mtu) || | 
 | 	    pkt_size > brmctx->br->dev->mtu) | 
 | 		return NULL; | 
 |  | 
 | 	skb = netdev_alloc_skb_ip_align(brmctx->br->dev, pkt_size); | 
 | 	if (!skb) | 
 | 		goto out; | 
 |  | 
 | 	__br_multicast_query_handle_vlan(brmctx, pmctx, skb); | 
 | 	skb->protocol = htons(ETH_P_IP); | 
 |  | 
 | 	skb_reset_mac_header(skb); | 
 | 	eth = eth_hdr(skb); | 
 |  | 
 | 	ether_addr_copy(eth->h_source, brmctx->br->dev->dev_addr); | 
 | 	ip_eth_mc_map(ip_dst, eth->h_dest); | 
 | 	eth->h_proto = htons(ETH_P_IP); | 
 | 	skb_put(skb, sizeof(*eth)); | 
 |  | 
 | 	skb_set_network_header(skb, skb->len); | 
 | 	iph = ip_hdr(skb); | 
 | 	iph->tot_len = htons(pkt_size - sizeof(*eth)); | 
 |  | 
 | 	iph->version = 4; | 
 | 	iph->ihl = 6; | 
 | 	iph->tos = 0xc0; | 
 | 	iph->id = 0; | 
 | 	iph->frag_off = htons(IP_DF); | 
 | 	iph->ttl = 1; | 
 | 	iph->protocol = IPPROTO_IGMP; | 
 | 	iph->saddr = br_opt_get(brmctx->br, BROPT_MULTICAST_QUERY_USE_IFADDR) ? | 
 | 		     inet_select_addr(brmctx->br->dev, 0, RT_SCOPE_LINK) : 0; | 
 | 	iph->daddr = ip_dst; | 
 | 	((u8 *)&iph[1])[0] = IPOPT_RA; | 
 | 	((u8 *)&iph[1])[1] = 4; | 
 | 	((u8 *)&iph[1])[2] = 0; | 
 | 	((u8 *)&iph[1])[3] = 0; | 
 | 	ip_send_check(iph); | 
 | 	skb_put(skb, 24); | 
 |  | 
 | 	skb_set_transport_header(skb, skb->len); | 
 | 	*igmp_type = IGMP_HOST_MEMBERSHIP_QUERY; | 
 |  | 
 | 	switch (brmctx->multicast_igmp_version) { | 
 | 	case 2: | 
 | 		ih = igmp_hdr(skb); | 
 | 		ih->type = IGMP_HOST_MEMBERSHIP_QUERY; | 
 | 		ih->code = (group ? brmctx->multicast_last_member_interval : | 
 | 				    brmctx->multicast_query_response_interval) / | 
 | 			   (HZ / IGMP_TIMER_SCALE); | 
 | 		ih->group = group; | 
 | 		ih->csum = 0; | 
 | 		csum = &ih->csum; | 
 | 		csum_start = (void *)ih; | 
 | 		break; | 
 | 	case 3: | 
 | 		ihv3 = igmpv3_query_hdr(skb); | 
 | 		ihv3->type = IGMP_HOST_MEMBERSHIP_QUERY; | 
 | 		ihv3->code = (group ? brmctx->multicast_last_member_interval : | 
 | 				      brmctx->multicast_query_response_interval) / | 
 | 			     (HZ / IGMP_TIMER_SCALE); | 
 | 		ihv3->group = group; | 
 | 		ihv3->qqic = brmctx->multicast_query_interval / HZ; | 
 | 		ihv3->nsrcs = htons(lmqt_srcs); | 
 | 		ihv3->resv = 0; | 
 | 		ihv3->suppress = sflag; | 
 | 		ihv3->qrv = 2; | 
 | 		ihv3->csum = 0; | 
 | 		csum = &ihv3->csum; | 
 | 		csum_start = (void *)ihv3; | 
 | 		if (!pg || !with_srcs) | 
 | 			break; | 
 |  | 
 | 		lmqt_srcs = 0; | 
 | 		hlist_for_each_entry(ent, &pg->src_list, node) { | 
 | 			if (over_lmqt == time_after(ent->timer.expires, | 
 | 						    lmqt) && | 
 | 			    ent->src_query_rexmit_cnt > 0) { | 
 | 				ihv3->srcs[lmqt_srcs++] = ent->addr.src.ip4; | 
 | 				ent->src_query_rexmit_cnt--; | 
 | 				if (need_rexmit && ent->src_query_rexmit_cnt) | 
 | 					*need_rexmit = true; | 
 | 			} | 
 | 		} | 
 | 		if (WARN_ON(lmqt_srcs != ntohs(ihv3->nsrcs))) { | 
 | 			kfree_skb(skb); | 
 | 			return NULL; | 
 | 		} | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	if (WARN_ON(!csum || !csum_start)) { | 
 | 		kfree_skb(skb); | 
 | 		return NULL; | 
 | 	} | 
 |  | 
 | 	*csum = ip_compute_csum(csum_start, igmp_hdr_size); | 
 | 	skb_put(skb, igmp_hdr_size); | 
 | 	__skb_pull(skb, sizeof(*eth)); | 
 |  | 
 | out: | 
 | 	return skb; | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge_mcast *brmctx, | 
 | 						    struct net_bridge_mcast_port *pmctx, | 
 | 						    struct net_bridge_port_group *pg, | 
 | 						    const struct in6_addr *ip6_dst, | 
 | 						    const struct in6_addr *group, | 
 | 						    bool with_srcs, bool over_llqt, | 
 | 						    u8 sflag, u8 *igmp_type, | 
 | 						    bool *need_rexmit) | 
 | { | 
 | 	struct net_bridge_port *p = pg ? pg->key.port : NULL; | 
 | 	struct net_bridge_group_src *ent; | 
 | 	size_t pkt_size, mld_hdr_size; | 
 | 	unsigned long now = jiffies; | 
 | 	struct mld2_query *mld2q; | 
 | 	void *csum_start = NULL; | 
 | 	unsigned long interval; | 
 | 	__sum16 *csum = NULL; | 
 | 	struct ipv6hdr *ip6h; | 
 | 	struct mld_msg *mldq; | 
 | 	struct sk_buff *skb; | 
 | 	unsigned long llqt; | 
 | 	struct ethhdr *eth; | 
 | 	u16 llqt_srcs = 0; | 
 | 	u8 *hopopt; | 
 |  | 
 | 	mld_hdr_size = sizeof(*mldq); | 
 | 	if (brmctx->multicast_mld_version == 2) { | 
 | 		mld_hdr_size = sizeof(*mld2q); | 
 | 		if (pg && with_srcs) { | 
 | 			llqt = now + (brmctx->multicast_last_member_interval * | 
 | 				      brmctx->multicast_last_member_count); | 
 | 			hlist_for_each_entry(ent, &pg->src_list, node) { | 
 | 				if (over_llqt == time_after(ent->timer.expires, | 
 | 							    llqt) && | 
 | 				    ent->src_query_rexmit_cnt > 0) | 
 | 					llqt_srcs++; | 
 | 			} | 
 |  | 
 | 			if (!llqt_srcs) | 
 | 				return NULL; | 
 | 			mld_hdr_size += llqt_srcs * sizeof(struct in6_addr); | 
 | 		} | 
 | 	} | 
 |  | 
 | 	pkt_size = sizeof(*eth) + sizeof(*ip6h) + 8 + mld_hdr_size; | 
 | 	if ((p && pkt_size > p->dev->mtu) || | 
 | 	    pkt_size > brmctx->br->dev->mtu) | 
 | 		return NULL; | 
 |  | 
 | 	skb = netdev_alloc_skb_ip_align(brmctx->br->dev, pkt_size); | 
 | 	if (!skb) | 
 | 		goto out; | 
 |  | 
 | 	__br_multicast_query_handle_vlan(brmctx, pmctx, skb); | 
 | 	skb->protocol = htons(ETH_P_IPV6); | 
 |  | 
 | 	/* Ethernet header */ | 
 | 	skb_reset_mac_header(skb); | 
 | 	eth = eth_hdr(skb); | 
 |  | 
 | 	ether_addr_copy(eth->h_source, brmctx->br->dev->dev_addr); | 
 | 	eth->h_proto = htons(ETH_P_IPV6); | 
 | 	skb_put(skb, sizeof(*eth)); | 
 |  | 
 | 	/* IPv6 header + HbH option */ | 
 | 	skb_set_network_header(skb, skb->len); | 
 | 	ip6h = ipv6_hdr(skb); | 
 |  | 
 | 	*(__force __be32 *)ip6h = htonl(0x60000000); | 
 | 	ip6h->payload_len = htons(8 + mld_hdr_size); | 
 | 	ip6h->nexthdr = IPPROTO_HOPOPTS; | 
 | 	ip6h->hop_limit = 1; | 
 | 	ip6h->daddr = *ip6_dst; | 
 | 	if (ipv6_dev_get_saddr(dev_net(brmctx->br->dev), brmctx->br->dev, | 
 | 			       &ip6h->daddr, 0, &ip6h->saddr)) { | 
 | 		kfree_skb(skb); | 
 | 		br_opt_toggle(brmctx->br, BROPT_HAS_IPV6_ADDR, false); | 
 | 		return NULL; | 
 | 	} | 
 |  | 
 | 	br_opt_toggle(brmctx->br, BROPT_HAS_IPV6_ADDR, true); | 
 | 	ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest); | 
 |  | 
 | 	hopopt = (u8 *)(ip6h + 1); | 
 | 	hopopt[0] = IPPROTO_ICMPV6;		/* next hdr */ | 
 | 	hopopt[1] = 0;				/* length of HbH */ | 
 | 	hopopt[2] = IPV6_TLV_ROUTERALERT;	/* Router Alert */ | 
 | 	hopopt[3] = 2;				/* Length of RA Option */ | 
 | 	hopopt[4] = 0;				/* Type = 0x0000 (MLD) */ | 
 | 	hopopt[5] = 0; | 
 | 	hopopt[6] = IPV6_TLV_PAD1;		/* Pad1 */ | 
 | 	hopopt[7] = IPV6_TLV_PAD1;		/* Pad1 */ | 
 |  | 
 | 	skb_put(skb, sizeof(*ip6h) + 8); | 
 |  | 
 | 	/* ICMPv6 */ | 
 | 	skb_set_transport_header(skb, skb->len); | 
 | 	interval = ipv6_addr_any(group) ? | 
 | 			brmctx->multicast_query_response_interval : | 
 | 			brmctx->multicast_last_member_interval; | 
 | 	*igmp_type = ICMPV6_MGM_QUERY; | 
 | 	switch (brmctx->multicast_mld_version) { | 
 | 	case 1: | 
 | 		mldq = (struct mld_msg *)icmp6_hdr(skb); | 
 | 		mldq->mld_type = ICMPV6_MGM_QUERY; | 
 | 		mldq->mld_code = 0; | 
 | 		mldq->mld_cksum = 0; | 
 | 		mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval)); | 
 | 		mldq->mld_reserved = 0; | 
 | 		mldq->mld_mca = *group; | 
 | 		csum = &mldq->mld_cksum; | 
 | 		csum_start = (void *)mldq; | 
 | 		break; | 
 | 	case 2: | 
 | 		mld2q = (struct mld2_query *)icmp6_hdr(skb); | 
 | 		mld2q->mld2q_mrc = htons((u16)jiffies_to_msecs(interval)); | 
 | 		mld2q->mld2q_type = ICMPV6_MGM_QUERY; | 
 | 		mld2q->mld2q_code = 0; | 
 | 		mld2q->mld2q_cksum = 0; | 
 | 		mld2q->mld2q_resv1 = 0; | 
 | 		mld2q->mld2q_resv2 = 0; | 
 | 		mld2q->mld2q_suppress = sflag; | 
 | 		mld2q->mld2q_qrv = 2; | 
 | 		mld2q->mld2q_nsrcs = htons(llqt_srcs); | 
 | 		mld2q->mld2q_qqic = brmctx->multicast_query_interval / HZ; | 
 | 		mld2q->mld2q_mca = *group; | 
 | 		csum = &mld2q->mld2q_cksum; | 
 | 		csum_start = (void *)mld2q; | 
 | 		if (!pg || !with_srcs) | 
 | 			break; | 
 |  | 
 | 		llqt_srcs = 0; | 
 | 		hlist_for_each_entry(ent, &pg->src_list, node) { | 
 | 			if (over_llqt == time_after(ent->timer.expires, | 
 | 						    llqt) && | 
 | 			    ent->src_query_rexmit_cnt > 0) { | 
 | 				mld2q->mld2q_srcs[llqt_srcs++] = ent->addr.src.ip6; | 
 | 				ent->src_query_rexmit_cnt--; | 
 | 				if (need_rexmit && ent->src_query_rexmit_cnt) | 
 | 					*need_rexmit = true; | 
 | 			} | 
 | 		} | 
 | 		if (WARN_ON(llqt_srcs != ntohs(mld2q->mld2q_nsrcs))) { | 
 | 			kfree_skb(skb); | 
 | 			return NULL; | 
 | 		} | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	if (WARN_ON(!csum || !csum_start)) { | 
 | 		kfree_skb(skb); | 
 | 		return NULL; | 
 | 	} | 
 |  | 
 | 	*csum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, mld_hdr_size, | 
 | 				IPPROTO_ICMPV6, | 
 | 				csum_partial(csum_start, mld_hdr_size, 0)); | 
 | 	skb_put(skb, mld_hdr_size); | 
 | 	__skb_pull(skb, sizeof(*eth)); | 
 |  | 
 | out: | 
 | 	return skb; | 
 | } | 
 | #endif | 
 |  | 
 | static struct sk_buff *br_multicast_alloc_query(struct net_bridge_mcast *brmctx, | 
 | 						struct net_bridge_mcast_port *pmctx, | 
 | 						struct net_bridge_port_group *pg, | 
 | 						struct br_ip *ip_dst, | 
 | 						struct br_ip *group, | 
 | 						bool with_srcs, bool over_lmqt, | 
 | 						u8 sflag, u8 *igmp_type, | 
 | 						bool *need_rexmit) | 
 | { | 
 | 	__be32 ip4_dst; | 
 |  | 
 | 	switch (group->proto) { | 
 | 	case htons(ETH_P_IP): | 
 | 		ip4_dst = ip_dst ? ip_dst->dst.ip4 : htonl(INADDR_ALLHOSTS_GROUP); | 
 | 		return br_ip4_multicast_alloc_query(brmctx, pmctx, pg, | 
 | 						    ip4_dst, group->dst.ip4, | 
 | 						    with_srcs, over_lmqt, | 
 | 						    sflag, igmp_type, | 
 | 						    need_rexmit); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case htons(ETH_P_IPV6): { | 
 | 		struct in6_addr ip6_dst; | 
 |  | 
 | 		if (ip_dst) | 
 | 			ip6_dst = ip_dst->dst.ip6; | 
 | 		else | 
 | 			ipv6_addr_set(&ip6_dst, htonl(0xff020000), 0, 0, | 
 | 				      htonl(1)); | 
 |  | 
 | 		return br_ip6_multicast_alloc_query(brmctx, pmctx, pg, | 
 | 						    &ip6_dst, &group->dst.ip6, | 
 | 						    with_srcs, over_lmqt, | 
 | 						    sflag, igmp_type, | 
 | 						    need_rexmit); | 
 | 	} | 
 | #endif | 
 | 	} | 
 | 	return NULL; | 
 | } | 
 |  | 
 | struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br, | 
 | 						    struct br_ip *group) | 
 | { | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	int err; | 
 |  | 
 | 	mp = br_mdb_ip_get(br, group); | 
 | 	if (mp) | 
 | 		return mp; | 
 |  | 
 | 	if (atomic_read(&br->mdb_hash_tbl.nelems) >= br->hash_max) { | 
 | 		trace_br_mdb_full(br->dev, group); | 
 | 		br_mc_disabled_update(br->dev, false, NULL); | 
 | 		br_opt_toggle(br, BROPT_MULTICAST_ENABLED, false); | 
 | 		return ERR_PTR(-E2BIG); | 
 | 	} | 
 |  | 
 | 	mp = kzalloc(sizeof(*mp), GFP_ATOMIC); | 
 | 	if (unlikely(!mp)) | 
 | 		return ERR_PTR(-ENOMEM); | 
 |  | 
 | 	mp->br = br; | 
 | 	mp->addr = *group; | 
 | 	mp->mcast_gc.destroy = br_multicast_destroy_mdb_entry; | 
 | 	timer_setup(&mp->timer, br_multicast_group_expired, 0); | 
 | 	err = rhashtable_lookup_insert_fast(&br->mdb_hash_tbl, &mp->rhnode, | 
 | 					    br_mdb_rht_params); | 
 | 	if (err) { | 
 | 		kfree(mp); | 
 | 		mp = ERR_PTR(err); | 
 | 	} else { | 
 | 		hlist_add_head_rcu(&mp->mdb_node, &br->mdb_list); | 
 | 	} | 
 |  | 
 | 	return mp; | 
 | } | 
 |  | 
 | static void br_multicast_group_src_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_group_src *src = timer_container_of(src, t, timer); | 
 | 	struct net_bridge_port_group *pg; | 
 | 	struct net_bridge *br = src->br; | 
 |  | 
 | 	spin_lock(&br->multicast_lock); | 
 | 	if (hlist_unhashed(&src->node) || !netif_running(br->dev) || | 
 | 	    timer_pending(&src->timer)) | 
 | 		goto out; | 
 |  | 
 | 	pg = src->pg; | 
 | 	if (pg->filter_mode == MCAST_INCLUDE) { | 
 | 		br_multicast_del_group_src(src, false); | 
 | 		if (!hlist_empty(&pg->src_list)) | 
 | 			goto out; | 
 | 		br_multicast_find_del_pg(br, pg); | 
 | 	} else { | 
 | 		br_multicast_fwd_src_handle(src); | 
 | 	} | 
 |  | 
 | out: | 
 | 	spin_unlock(&br->multicast_lock); | 
 | } | 
 |  | 
 | struct net_bridge_group_src * | 
 | br_multicast_find_group_src(struct net_bridge_port_group *pg, struct br_ip *ip) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 |  | 
 | 	switch (ip->proto) { | 
 | 	case htons(ETH_P_IP): | 
 | 		hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 			if (ip->src.ip4 == ent->addr.src.ip4) | 
 | 				return ent; | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case htons(ETH_P_IPV6): | 
 | 		hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 			if (!ipv6_addr_cmp(&ent->addr.src.ip6, &ip->src.ip6)) | 
 | 				return ent; | 
 | 		break; | 
 | #endif | 
 | 	} | 
 |  | 
 | 	return NULL; | 
 | } | 
 |  | 
 | struct net_bridge_group_src * | 
 | br_multicast_new_group_src(struct net_bridge_port_group *pg, struct br_ip *src_ip) | 
 | { | 
 | 	struct net_bridge_group_src *grp_src; | 
 |  | 
 | 	if (unlikely(pg->src_ents >= PG_SRC_ENT_LIMIT)) | 
 | 		return NULL; | 
 |  | 
 | 	switch (src_ip->proto) { | 
 | 	case htons(ETH_P_IP): | 
 | 		if (ipv4_is_zeronet(src_ip->src.ip4) || | 
 | 		    ipv4_is_multicast(src_ip->src.ip4)) | 
 | 			return NULL; | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case htons(ETH_P_IPV6): | 
 | 		if (ipv6_addr_any(&src_ip->src.ip6) || | 
 | 		    ipv6_addr_is_multicast(&src_ip->src.ip6)) | 
 | 			return NULL; | 
 | 		break; | 
 | #endif | 
 | 	} | 
 |  | 
 | 	grp_src = kzalloc(sizeof(*grp_src), GFP_ATOMIC); | 
 | 	if (unlikely(!grp_src)) | 
 | 		return NULL; | 
 |  | 
 | 	grp_src->pg = pg; | 
 | 	grp_src->br = pg->key.port->br; | 
 | 	grp_src->addr = *src_ip; | 
 | 	grp_src->mcast_gc.destroy = br_multicast_destroy_group_src; | 
 | 	timer_setup(&grp_src->timer, br_multicast_group_src_expired, 0); | 
 |  | 
 | 	hlist_add_head_rcu(&grp_src->node, &pg->src_list); | 
 | 	pg->src_ents++; | 
 |  | 
 | 	return grp_src; | 
 | } | 
 |  | 
 | struct net_bridge_port_group *br_multicast_new_port_group( | 
 | 			struct net_bridge_port *port, | 
 | 			const struct br_ip *group, | 
 | 			struct net_bridge_port_group __rcu *next, | 
 | 			unsigned char flags, | 
 | 			const unsigned char *src, | 
 | 			u8 filter_mode, | 
 | 			u8 rt_protocol, | 
 | 			struct netlink_ext_ack *extack) | 
 | { | 
 | 	struct net_bridge_port_group *p; | 
 | 	int err; | 
 |  | 
 | 	err = br_multicast_port_ngroups_inc(port, group, extack); | 
 | 	if (err) | 
 | 		return NULL; | 
 |  | 
 | 	p = kzalloc(sizeof(*p), GFP_ATOMIC); | 
 | 	if (unlikely(!p)) { | 
 | 		NL_SET_ERR_MSG_MOD(extack, "Couldn't allocate new port group"); | 
 | 		goto dec_out; | 
 | 	} | 
 |  | 
 | 	p->key.addr = *group; | 
 | 	p->key.port = port; | 
 | 	p->flags = flags; | 
 | 	p->filter_mode = filter_mode; | 
 | 	p->rt_protocol = rt_protocol; | 
 | 	p->eht_host_tree = RB_ROOT; | 
 | 	p->eht_set_tree = RB_ROOT; | 
 | 	p->mcast_gc.destroy = br_multicast_destroy_port_group; | 
 | 	INIT_HLIST_HEAD(&p->src_list); | 
 |  | 
 | 	if (!br_multicast_is_star_g(group) && | 
 | 	    rhashtable_lookup_insert_fast(&port->br->sg_port_tbl, &p->rhnode, | 
 | 					  br_sg_port_rht_params)) { | 
 | 		NL_SET_ERR_MSG_MOD(extack, "Couldn't insert new port group"); | 
 | 		goto free_out; | 
 | 	} | 
 |  | 
 | 	rcu_assign_pointer(p->next, next); | 
 | 	timer_setup(&p->timer, br_multicast_port_group_expired, 0); | 
 | 	timer_setup(&p->rexmit_timer, br_multicast_port_group_rexmit, 0); | 
 | 	hlist_add_head(&p->mglist, &port->mglist); | 
 |  | 
 | 	if (src) | 
 | 		memcpy(p->eth_addr, src, ETH_ALEN); | 
 | 	else | 
 | 		eth_broadcast_addr(p->eth_addr); | 
 |  | 
 | 	return p; | 
 |  | 
 | free_out: | 
 | 	kfree(p); | 
 | dec_out: | 
 | 	br_multicast_port_ngroups_dec(port, group->vid); | 
 | 	return NULL; | 
 | } | 
 |  | 
 | void br_multicast_del_port_group(struct net_bridge_port_group *p) | 
 | { | 
 | 	struct net_bridge_port *port = p->key.port; | 
 | 	__u16 vid = p->key.addr.vid; | 
 |  | 
 | 	hlist_del_init(&p->mglist); | 
 | 	if (!br_multicast_is_star_g(&p->key.addr)) | 
 | 		rhashtable_remove_fast(&port->br->sg_port_tbl, &p->rhnode, | 
 | 				       br_sg_port_rht_params); | 
 | 	kfree(p); | 
 | 	br_multicast_port_ngroups_dec(port, vid); | 
 | } | 
 |  | 
 | void br_multicast_host_join(const struct net_bridge_mcast *brmctx, | 
 | 			    struct net_bridge_mdb_entry *mp, bool notify) | 
 | { | 
 | 	if (!mp->host_joined) { | 
 | 		mp->host_joined = true; | 
 | 		if (br_multicast_is_star_g(&mp->addr)) | 
 | 			br_multicast_star_g_host_state(mp); | 
 | 		if (notify) | 
 | 			br_mdb_notify(mp->br->dev, mp, NULL, RTM_NEWMDB); | 
 | 	} | 
 |  | 
 | 	if (br_group_is_l2(&mp->addr)) | 
 | 		return; | 
 |  | 
 | 	mod_timer(&mp->timer, jiffies + brmctx->multicast_membership_interval); | 
 | } | 
 |  | 
 | void br_multicast_host_leave(struct net_bridge_mdb_entry *mp, bool notify) | 
 | { | 
 | 	if (!mp->host_joined) | 
 | 		return; | 
 |  | 
 | 	mp->host_joined = false; | 
 | 	if (br_multicast_is_star_g(&mp->addr)) | 
 | 		br_multicast_star_g_host_state(mp); | 
 | 	if (notify) | 
 | 		br_mdb_notify(mp->br->dev, mp, NULL, RTM_DELMDB); | 
 | } | 
 |  | 
 | static struct net_bridge_port_group * | 
 | __br_multicast_add_group(struct net_bridge_mcast *brmctx, | 
 | 			 struct net_bridge_mcast_port *pmctx, | 
 | 			 struct br_ip *group, | 
 | 			 const unsigned char *src, | 
 | 			 u8 filter_mode, | 
 | 			 bool igmpv2_mldv1, | 
 | 			 bool blocked) | 
 | { | 
 | 	struct net_bridge_port_group __rcu **pp; | 
 | 	struct net_bridge_port_group *p = NULL; | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	unsigned long now = jiffies; | 
 |  | 
 | 	if (!br_multicast_ctx_should_use(brmctx, pmctx)) | 
 | 		goto out; | 
 |  | 
 | 	mp = br_multicast_new_group(brmctx->br, group); | 
 | 	if (IS_ERR(mp)) | 
 | 		return ERR_CAST(mp); | 
 |  | 
 | 	if (!pmctx) { | 
 | 		br_multicast_host_join(brmctx, mp, true); | 
 | 		goto out; | 
 | 	} | 
 |  | 
 | 	for (pp = &mp->ports; | 
 | 	     (p = mlock_dereference(*pp, brmctx->br)) != NULL; | 
 | 	     pp = &p->next) { | 
 | 		if (br_port_group_equal(p, pmctx->port, src)) | 
 | 			goto found; | 
 | 		if ((unsigned long)p->key.port < (unsigned long)pmctx->port) | 
 | 			break; | 
 | 	} | 
 |  | 
 | 	p = br_multicast_new_port_group(pmctx->port, group, *pp, 0, src, | 
 | 					filter_mode, RTPROT_KERNEL, NULL); | 
 | 	if (unlikely(!p)) { | 
 | 		p = ERR_PTR(-ENOMEM); | 
 | 		goto out; | 
 | 	} | 
 | 	rcu_assign_pointer(*pp, p); | 
 | 	if (blocked) | 
 | 		p->flags |= MDB_PG_FLAGS_BLOCKED; | 
 | 	br_mdb_notify(brmctx->br->dev, mp, p, RTM_NEWMDB); | 
 |  | 
 | found: | 
 | 	if (igmpv2_mldv1) | 
 | 		mod_timer(&p->timer, | 
 | 			  now + brmctx->multicast_membership_interval); | 
 |  | 
 | out: | 
 | 	return p; | 
 | } | 
 |  | 
 | static int br_multicast_add_group(struct net_bridge_mcast *brmctx, | 
 | 				  struct net_bridge_mcast_port *pmctx, | 
 | 				  struct br_ip *group, | 
 | 				  const unsigned char *src, | 
 | 				  u8 filter_mode, | 
 | 				  bool igmpv2_mldv1) | 
 | { | 
 | 	struct net_bridge_port_group *pg; | 
 | 	int err; | 
 |  | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	pg = __br_multicast_add_group(brmctx, pmctx, group, src, filter_mode, | 
 | 				      igmpv2_mldv1, false); | 
 | 	/* NULL is considered valid for host joined groups */ | 
 | 	err = PTR_ERR_OR_ZERO(pg); | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 |  | 
 | 	return err; | 
 | } | 
 |  | 
 | static int br_ip4_multicast_add_group(struct net_bridge_mcast *brmctx, | 
 | 				      struct net_bridge_mcast_port *pmctx, | 
 | 				      __be32 group, | 
 | 				      __u16 vid, | 
 | 				      const unsigned char *src, | 
 | 				      bool igmpv2) | 
 | { | 
 | 	struct br_ip br_group; | 
 | 	u8 filter_mode; | 
 |  | 
 | 	if (ipv4_is_local_multicast(group)) | 
 | 		return 0; | 
 |  | 
 | 	memset(&br_group, 0, sizeof(br_group)); | 
 | 	br_group.dst.ip4 = group; | 
 | 	br_group.proto = htons(ETH_P_IP); | 
 | 	br_group.vid = vid; | 
 | 	filter_mode = igmpv2 ? MCAST_EXCLUDE : MCAST_INCLUDE; | 
 |  | 
 | 	return br_multicast_add_group(brmctx, pmctx, &br_group, src, | 
 | 				      filter_mode, igmpv2); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static int br_ip6_multicast_add_group(struct net_bridge_mcast *brmctx, | 
 | 				      struct net_bridge_mcast_port *pmctx, | 
 | 				      const struct in6_addr *group, | 
 | 				      __u16 vid, | 
 | 				      const unsigned char *src, | 
 | 				      bool mldv1) | 
 | { | 
 | 	struct br_ip br_group; | 
 | 	u8 filter_mode; | 
 |  | 
 | 	if (ipv6_addr_is_ll_all_nodes(group)) | 
 | 		return 0; | 
 |  | 
 | 	memset(&br_group, 0, sizeof(br_group)); | 
 | 	br_group.dst.ip6 = *group; | 
 | 	br_group.proto = htons(ETH_P_IPV6); | 
 | 	br_group.vid = vid; | 
 | 	filter_mode = mldv1 ? MCAST_EXCLUDE : MCAST_INCLUDE; | 
 |  | 
 | 	return br_multicast_add_group(brmctx, pmctx, &br_group, src, | 
 | 				      filter_mode, mldv1); | 
 | } | 
 | #endif | 
 |  | 
 | static bool br_multicast_rport_del(struct hlist_node *rlist) | 
 | { | 
 | 	if (hlist_unhashed(rlist)) | 
 | 		return false; | 
 |  | 
 | 	hlist_del_init_rcu(rlist); | 
 | 	return true; | 
 | } | 
 |  | 
 | static bool br_ip4_multicast_rport_del(struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	return br_multicast_rport_del(&pmctx->ip4_rlist); | 
 | } | 
 |  | 
 | static bool br_ip6_multicast_rport_del(struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	return br_multicast_rport_del(&pmctx->ip6_rlist); | 
 | #else | 
 | 	return false; | 
 | #endif | 
 | } | 
 |  | 
 | static void br_multicast_router_expired(struct net_bridge_mcast_port *pmctx, | 
 | 					struct timer_list *t, | 
 | 					struct hlist_node *rlist) | 
 | { | 
 | 	struct net_bridge *br = pmctx->port->br; | 
 | 	bool del; | 
 |  | 
 | 	spin_lock(&br->multicast_lock); | 
 | 	if (pmctx->multicast_router == MDB_RTR_TYPE_DISABLED || | 
 | 	    pmctx->multicast_router == MDB_RTR_TYPE_PERM || | 
 | 	    timer_pending(t)) | 
 | 		goto out; | 
 |  | 
 | 	del = br_multicast_rport_del(rlist); | 
 | 	br_multicast_rport_del_notify(pmctx, del); | 
 | out: | 
 | 	spin_unlock(&br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_router_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx = timer_container_of(pmctx, t, | 
 | 								 ip4_mc_router_timer); | 
 |  | 
 | 	br_multicast_router_expired(pmctx, t, &pmctx->ip4_rlist); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_router_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx = timer_container_of(pmctx, t, | 
 | 								 ip6_mc_router_timer); | 
 |  | 
 | 	br_multicast_router_expired(pmctx, t, &pmctx->ip6_rlist); | 
 | } | 
 | #endif | 
 |  | 
 | static void br_mc_router_state_change(struct net_bridge *p, | 
 | 				      bool is_mc_router) | 
 | { | 
 | 	struct switchdev_attr attr = { | 
 | 		.orig_dev = p->dev, | 
 | 		.id = SWITCHDEV_ATTR_ID_BRIDGE_MROUTER, | 
 | 		.flags = SWITCHDEV_F_DEFER, | 
 | 		.u.mrouter = is_mc_router, | 
 | 	}; | 
 |  | 
 | 	switchdev_port_attr_set(p->dev, &attr, NULL); | 
 | } | 
 |  | 
 | static void br_multicast_local_router_expired(struct net_bridge_mcast *brmctx, | 
 | 					      struct timer_list *timer) | 
 | { | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	if (brmctx->multicast_router == MDB_RTR_TYPE_DISABLED || | 
 | 	    brmctx->multicast_router == MDB_RTR_TYPE_PERM || | 
 | 	    br_ip4_multicast_is_router(brmctx) || | 
 | 	    br_ip6_multicast_is_router(brmctx)) | 
 | 		goto out; | 
 |  | 
 | 	br_mc_router_state_change(brmctx->br, false); | 
 | out: | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_local_router_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast *brmctx = timer_container_of(brmctx, t, | 
 | 							     ip4_mc_router_timer); | 
 |  | 
 | 	br_multicast_local_router_expired(brmctx, t); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_local_router_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast *brmctx = timer_container_of(brmctx, t, | 
 | 							     ip6_mc_router_timer); | 
 |  | 
 | 	br_multicast_local_router_expired(brmctx, t); | 
 | } | 
 | #endif | 
 |  | 
 | static void br_multicast_querier_expired(struct net_bridge_mcast *brmctx, | 
 | 					 struct bridge_mcast_own_query *query) | 
 | { | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	if (!netif_running(brmctx->br->dev) || | 
 | 	    br_multicast_ctx_vlan_global_disabled(brmctx) || | 
 | 	    !br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED)) | 
 | 		goto out; | 
 |  | 
 | 	br_multicast_start_querier(brmctx, query); | 
 |  | 
 | out: | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_querier_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast *brmctx = timer_container_of(brmctx, t, | 
 | 							     ip4_other_query.timer); | 
 |  | 
 | 	br_multicast_querier_expired(brmctx, &brmctx->ip4_own_query); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_querier_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast *brmctx = timer_container_of(brmctx, t, | 
 | 							     ip6_other_query.timer); | 
 |  | 
 | 	br_multicast_querier_expired(brmctx, &brmctx->ip6_own_query); | 
 | } | 
 | #endif | 
 |  | 
 | static void br_multicast_query_delay_expired(struct timer_list *t) | 
 | { | 
 | } | 
 |  | 
 | static void br_multicast_select_own_querier(struct net_bridge_mcast *brmctx, | 
 | 					    struct br_ip *ip, | 
 | 					    struct sk_buff *skb) | 
 | { | 
 | 	if (ip->proto == htons(ETH_P_IP)) | 
 | 		brmctx->ip4_querier.addr.src.ip4 = ip_hdr(skb)->saddr; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	else | 
 | 		brmctx->ip6_querier.addr.src.ip6 = ipv6_hdr(skb)->saddr; | 
 | #endif | 
 | } | 
 |  | 
 | static void __br_multicast_send_query(struct net_bridge_mcast *brmctx, | 
 | 				      struct net_bridge_mcast_port *pmctx, | 
 | 				      struct net_bridge_port_group *pg, | 
 | 				      struct br_ip *ip_dst, | 
 | 				      struct br_ip *group, | 
 | 				      bool with_srcs, | 
 | 				      u8 sflag, | 
 | 				      bool *need_rexmit) | 
 | { | 
 | 	bool over_lmqt = !!sflag; | 
 | 	struct sk_buff *skb; | 
 | 	u8 igmp_type; | 
 |  | 
 | 	if (!br_multicast_ctx_should_use(brmctx, pmctx) || | 
 | 	    !br_multicast_ctx_matches_vlan_snooping(brmctx)) | 
 | 		return; | 
 |  | 
 | again_under_lmqt: | 
 | 	skb = br_multicast_alloc_query(brmctx, pmctx, pg, ip_dst, group, | 
 | 				       with_srcs, over_lmqt, sflag, &igmp_type, | 
 | 				       need_rexmit); | 
 | 	if (!skb) | 
 | 		return; | 
 |  | 
 | 	if (pmctx) { | 
 | 		skb->dev = pmctx->port->dev; | 
 | 		br_multicast_count(brmctx->br, pmctx->port, skb, igmp_type, | 
 | 				   BR_MCAST_DIR_TX); | 
 | 		NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT, | 
 | 			dev_net(pmctx->port->dev), NULL, skb, NULL, skb->dev, | 
 | 			br_dev_queue_push_xmit); | 
 |  | 
 | 		if (over_lmqt && with_srcs && sflag) { | 
 | 			over_lmqt = false; | 
 | 			goto again_under_lmqt; | 
 | 		} | 
 | 	} else { | 
 | 		br_multicast_select_own_querier(brmctx, group, skb); | 
 | 		br_multicast_count(brmctx->br, NULL, skb, igmp_type, | 
 | 				   BR_MCAST_DIR_RX); | 
 | 		netif_rx(skb); | 
 | 	} | 
 | } | 
 |  | 
 | static void br_multicast_read_querier(const struct bridge_mcast_querier *querier, | 
 | 				      struct bridge_mcast_querier *dest) | 
 | { | 
 | 	unsigned int seq; | 
 |  | 
 | 	memset(dest, 0, sizeof(*dest)); | 
 | 	do { | 
 | 		seq = read_seqcount_begin(&querier->seq); | 
 | 		dest->port_ifidx = querier->port_ifidx; | 
 | 		memcpy(&dest->addr, &querier->addr, sizeof(struct br_ip)); | 
 | 	} while (read_seqcount_retry(&querier->seq, seq)); | 
 | } | 
 |  | 
 | static void br_multicast_update_querier(struct net_bridge_mcast *brmctx, | 
 | 					struct bridge_mcast_querier *querier, | 
 | 					int ifindex, | 
 | 					struct br_ip *saddr) | 
 | { | 
 | 	write_seqcount_begin(&querier->seq); | 
 | 	querier->port_ifidx = ifindex; | 
 | 	memcpy(&querier->addr, saddr, sizeof(*saddr)); | 
 | 	write_seqcount_end(&querier->seq); | 
 | } | 
 |  | 
 | static void br_multicast_send_query(struct net_bridge_mcast *brmctx, | 
 | 				    struct net_bridge_mcast_port *pmctx, | 
 | 				    struct bridge_mcast_own_query *own_query) | 
 | { | 
 | 	struct bridge_mcast_other_query *other_query = NULL; | 
 | 	struct bridge_mcast_querier *querier; | 
 | 	struct br_ip br_group; | 
 | 	unsigned long time; | 
 |  | 
 | 	if (!br_multicast_ctx_should_use(brmctx, pmctx) || | 
 | 	    !br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED) || | 
 | 	    !brmctx->multicast_querier) | 
 | 		return; | 
 |  | 
 | 	memset(&br_group.dst, 0, sizeof(br_group.dst)); | 
 |  | 
 | 	if (pmctx ? (own_query == &pmctx->ip4_own_query) : | 
 | 		    (own_query == &brmctx->ip4_own_query)) { | 
 | 		querier = &brmctx->ip4_querier; | 
 | 		other_query = &brmctx->ip4_other_query; | 
 | 		br_group.proto = htons(ETH_P_IP); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	} else { | 
 | 		querier = &brmctx->ip6_querier; | 
 | 		other_query = &brmctx->ip6_other_query; | 
 | 		br_group.proto = htons(ETH_P_IPV6); | 
 | #endif | 
 | 	} | 
 |  | 
 | 	if (!other_query || timer_pending(&other_query->timer)) | 
 | 		return; | 
 |  | 
 | 	/* we're about to select ourselves as querier */ | 
 | 	if (!pmctx && querier->port_ifidx) { | 
 | 		struct br_ip zeroip = {}; | 
 |  | 
 | 		br_multicast_update_querier(brmctx, querier, 0, &zeroip); | 
 | 	} | 
 |  | 
 | 	__br_multicast_send_query(brmctx, pmctx, NULL, NULL, &br_group, false, | 
 | 				  0, NULL); | 
 |  | 
 | 	time = jiffies; | 
 | 	time += own_query->startup_sent < brmctx->multicast_startup_query_count ? | 
 | 		brmctx->multicast_startup_query_interval : | 
 | 		brmctx->multicast_query_interval; | 
 | 	mod_timer(&own_query->timer, time); | 
 | } | 
 |  | 
 | static void | 
 | br_multicast_port_query_expired(struct net_bridge_mcast_port *pmctx, | 
 | 				struct bridge_mcast_own_query *query) | 
 | { | 
 | 	struct net_bridge *br = pmctx->port->br; | 
 | 	struct net_bridge_mcast *brmctx; | 
 |  | 
 | 	spin_lock(&br->multicast_lock); | 
 | 	if (br_multicast_port_ctx_state_stopped(pmctx)) | 
 | 		goto out; | 
 |  | 
 | 	brmctx = br_multicast_port_ctx_get_global(pmctx); | 
 | 	if (query->startup_sent < brmctx->multicast_startup_query_count) | 
 | 		query->startup_sent++; | 
 |  | 
 | 	br_multicast_send_query(brmctx, pmctx, query); | 
 |  | 
 | out: | 
 | 	spin_unlock(&br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_port_query_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx = timer_container_of(pmctx, t, | 
 | 								 ip4_own_query.timer); | 
 |  | 
 | 	br_multicast_port_query_expired(pmctx, &pmctx->ip4_own_query); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_port_query_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx = timer_container_of(pmctx, t, | 
 | 								 ip6_own_query.timer); | 
 |  | 
 | 	br_multicast_port_query_expired(pmctx, &pmctx->ip6_own_query); | 
 | } | 
 | #endif | 
 |  | 
 | static void br_multicast_port_group_rexmit(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_port_group *pg = timer_container_of(pg, t, | 
 | 							      rexmit_timer); | 
 | 	struct bridge_mcast_other_query *other_query = NULL; | 
 | 	struct net_bridge *br = pg->key.port->br; | 
 | 	struct net_bridge_mcast_port *pmctx; | 
 | 	struct net_bridge_mcast *brmctx; | 
 | 	bool need_rexmit = false; | 
 |  | 
 | 	spin_lock(&br->multicast_lock); | 
 | 	if (!netif_running(br->dev) || hlist_unhashed(&pg->mglist) || | 
 | 	    !br_opt_get(br, BROPT_MULTICAST_ENABLED)) | 
 | 		goto out; | 
 |  | 
 | 	pmctx = br_multicast_pg_to_port_ctx(pg); | 
 | 	if (!pmctx) | 
 | 		goto out; | 
 | 	brmctx = br_multicast_port_ctx_get_global(pmctx); | 
 | 	if (!brmctx->multicast_querier) | 
 | 		goto out; | 
 |  | 
 | 	if (pg->key.addr.proto == htons(ETH_P_IP)) | 
 | 		other_query = &brmctx->ip4_other_query; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	else | 
 | 		other_query = &brmctx->ip6_other_query; | 
 | #endif | 
 |  | 
 | 	if (!other_query || timer_pending(&other_query->timer)) | 
 | 		goto out; | 
 |  | 
 | 	if (pg->grp_query_rexmit_cnt) { | 
 | 		pg->grp_query_rexmit_cnt--; | 
 | 		__br_multicast_send_query(brmctx, pmctx, pg, &pg->key.addr, | 
 | 					  &pg->key.addr, false, 1, NULL); | 
 | 	} | 
 | 	__br_multicast_send_query(brmctx, pmctx, pg, &pg->key.addr, | 
 | 				  &pg->key.addr, true, 0, &need_rexmit); | 
 |  | 
 | 	if (pg->grp_query_rexmit_cnt || need_rexmit) | 
 | 		mod_timer(&pg->rexmit_timer, jiffies + | 
 | 					     brmctx->multicast_last_member_interval); | 
 | out: | 
 | 	spin_unlock(&br->multicast_lock); | 
 | } | 
 |  | 
 | static int br_mc_disabled_update(struct net_device *dev, bool value, | 
 | 				 struct netlink_ext_ack *extack) | 
 | { | 
 | 	struct switchdev_attr attr = { | 
 | 		.orig_dev = dev, | 
 | 		.id = SWITCHDEV_ATTR_ID_BRIDGE_MC_DISABLED, | 
 | 		.flags = SWITCHDEV_F_DEFER, | 
 | 		.u.mc_disabled = !value, | 
 | 	}; | 
 |  | 
 | 	return switchdev_port_attr_set(dev, &attr, extack); | 
 | } | 
 |  | 
 | void br_multicast_port_ctx_init(struct net_bridge_port *port, | 
 | 				struct net_bridge_vlan *vlan, | 
 | 				struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	pmctx->port = port; | 
 | 	pmctx->vlan = vlan; | 
 | 	pmctx->multicast_router = MDB_RTR_TYPE_TEMP_QUERY; | 
 | 	timer_setup(&pmctx->ip4_mc_router_timer, | 
 | 		    br_ip4_multicast_router_expired, 0); | 
 | 	timer_setup(&pmctx->ip4_own_query.timer, | 
 | 		    br_ip4_multicast_port_query_expired, 0); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	timer_setup(&pmctx->ip6_mc_router_timer, | 
 | 		    br_ip6_multicast_router_expired, 0); | 
 | 	timer_setup(&pmctx->ip6_own_query.timer, | 
 | 		    br_ip6_multicast_port_query_expired, 0); | 
 | #endif | 
 | } | 
 |  | 
 | void br_multicast_port_ctx_deinit(struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	struct net_bridge *br = pmctx->port->br; | 
 | 	bool del = false; | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	timer_delete_sync(&pmctx->ip6_mc_router_timer); | 
 | #endif | 
 | 	timer_delete_sync(&pmctx->ip4_mc_router_timer); | 
 |  | 
 | 	spin_lock_bh(&br->multicast_lock); | 
 | 	del |= br_ip6_multicast_rport_del(pmctx); | 
 | 	del |= br_ip4_multicast_rport_del(pmctx); | 
 | 	br_multicast_rport_del_notify(pmctx, del); | 
 | 	spin_unlock_bh(&br->multicast_lock); | 
 | } | 
 |  | 
 | int br_multicast_add_port(struct net_bridge_port *port) | 
 | { | 
 | 	int err; | 
 |  | 
 | 	port->multicast_eht_hosts_limit = BR_MCAST_DEFAULT_EHT_HOSTS_LIMIT; | 
 | 	br_multicast_port_ctx_init(port, NULL, &port->multicast_ctx); | 
 |  | 
 | 	err = br_mc_disabled_update(port->dev, | 
 | 				    br_opt_get(port->br, | 
 | 					       BROPT_MULTICAST_ENABLED), | 
 | 				    NULL); | 
 | 	if (err && err != -EOPNOTSUPP) | 
 | 		return err; | 
 |  | 
 | 	port->mcast_stats = netdev_alloc_pcpu_stats(struct bridge_mcast_stats); | 
 | 	if (!port->mcast_stats) | 
 | 		return -ENOMEM; | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | void br_multicast_del_port(struct net_bridge_port *port) | 
 | { | 
 | 	struct net_bridge *br = port->br; | 
 | 	struct net_bridge_port_group *pg; | 
 | 	struct hlist_node *n; | 
 |  | 
 | 	/* Take care of the remaining groups, only perm ones should be left */ | 
 | 	spin_lock_bh(&br->multicast_lock); | 
 | 	hlist_for_each_entry_safe(pg, n, &port->mglist, mglist) | 
 | 		br_multicast_find_del_pg(br, pg); | 
 | 	spin_unlock_bh(&br->multicast_lock); | 
 | 	flush_work(&br->mcast_gc_work); | 
 | 	br_multicast_port_ctx_deinit(&port->multicast_ctx); | 
 | 	free_percpu(port->mcast_stats); | 
 | } | 
 |  | 
 | static void br_multicast_enable(struct bridge_mcast_own_query *query) | 
 | { | 
 | 	query->startup_sent = 0; | 
 |  | 
 | 	if (timer_delete_sync_try(&query->timer) >= 0 || | 
 | 	    timer_delete(&query->timer)) | 
 | 		mod_timer(&query->timer, jiffies); | 
 | } | 
 |  | 
 | static void __br_multicast_enable_port_ctx(struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	struct net_bridge *br = pmctx->port->br; | 
 | 	struct net_bridge_mcast *brmctx; | 
 |  | 
 | 	brmctx = br_multicast_port_ctx_get_global(pmctx); | 
 | 	if (!br_opt_get(br, BROPT_MULTICAST_ENABLED) || | 
 | 	    !netif_running(br->dev)) | 
 | 		return; | 
 |  | 
 | 	br_multicast_enable(&pmctx->ip4_own_query); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	br_multicast_enable(&pmctx->ip6_own_query); | 
 | #endif | 
 | 	if (pmctx->multicast_router == MDB_RTR_TYPE_PERM) { | 
 | 		br_ip4_multicast_add_router(brmctx, pmctx); | 
 | 		br_ip6_multicast_add_router(brmctx, pmctx); | 
 | 	} | 
 |  | 
 | 	if (br_multicast_port_ctx_is_vlan(pmctx)) { | 
 | 		struct net_bridge_port_group *pg; | 
 | 		u32 n = 0; | 
 |  | 
 | 		/* The mcast_n_groups counter might be wrong. First, | 
 | 		 * BR_VLFLAG_MCAST_ENABLED is toggled before temporary entries | 
 | 		 * are flushed, thus mcast_n_groups after the toggle does not | 
 | 		 * reflect the true values. And second, permanent entries added | 
 | 		 * while BR_VLFLAG_MCAST_ENABLED was disabled, are not reflected | 
 | 		 * either. Thus we have to refresh the counter. | 
 | 		 */ | 
 |  | 
 | 		hlist_for_each_entry(pg, &pmctx->port->mglist, mglist) { | 
 | 			if (pg->key.addr.vid == pmctx->vlan->vid) | 
 | 				n++; | 
 | 		} | 
 | 		WRITE_ONCE(pmctx->mdb_n_entries, n); | 
 | 	} | 
 | } | 
 |  | 
 | static void br_multicast_enable_port_ctx(struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	struct net_bridge *br = pmctx->port->br; | 
 |  | 
 | 	spin_lock_bh(&br->multicast_lock); | 
 | 	if (br_multicast_port_ctx_is_vlan(pmctx) && | 
 | 	    !(pmctx->vlan->priv_flags & BR_VLFLAG_MCAST_ENABLED)) { | 
 | 		spin_unlock_bh(&br->multicast_lock); | 
 | 		return; | 
 | 	} | 
 | 	__br_multicast_enable_port_ctx(pmctx); | 
 | 	spin_unlock_bh(&br->multicast_lock); | 
 | } | 
 |  | 
 | static void __br_multicast_disable_port_ctx(struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	struct net_bridge_port_group *pg; | 
 | 	struct hlist_node *n; | 
 | 	bool del = false; | 
 |  | 
 | 	hlist_for_each_entry_safe(pg, n, &pmctx->port->mglist, mglist) | 
 | 		if (!(pg->flags & MDB_PG_FLAGS_PERMANENT) && | 
 | 		    (!br_multicast_port_ctx_is_vlan(pmctx) || | 
 | 		     pg->key.addr.vid == pmctx->vlan->vid)) | 
 | 			br_multicast_find_del_pg(pmctx->port->br, pg); | 
 |  | 
 | 	del |= br_ip4_multicast_rport_del(pmctx); | 
 | 	timer_delete(&pmctx->ip4_mc_router_timer); | 
 | 	timer_delete(&pmctx->ip4_own_query.timer); | 
 | 	del |= br_ip6_multicast_rport_del(pmctx); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	timer_delete(&pmctx->ip6_mc_router_timer); | 
 | 	timer_delete(&pmctx->ip6_own_query.timer); | 
 | #endif | 
 | 	br_multicast_rport_del_notify(pmctx, del); | 
 | } | 
 |  | 
 | static void br_multicast_disable_port_ctx(struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	struct net_bridge *br = pmctx->port->br; | 
 |  | 
 | 	spin_lock_bh(&br->multicast_lock); | 
 | 	if (br_multicast_port_ctx_is_vlan(pmctx) && | 
 | 	    !(pmctx->vlan->priv_flags & BR_VLFLAG_MCAST_ENABLED)) { | 
 | 		spin_unlock_bh(&br->multicast_lock); | 
 | 		return; | 
 | 	} | 
 |  | 
 | 	__br_multicast_disable_port_ctx(pmctx); | 
 | 	spin_unlock_bh(&br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_multicast_toggle_port(struct net_bridge_port *port, bool on) | 
 | { | 
 | #if IS_ENABLED(CONFIG_BRIDGE_VLAN_FILTERING) | 
 | 	if (br_opt_get(port->br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) { | 
 | 		struct net_bridge_vlan_group *vg; | 
 | 		struct net_bridge_vlan *vlan; | 
 |  | 
 | 		rcu_read_lock(); | 
 | 		vg = nbp_vlan_group_rcu(port); | 
 | 		if (!vg) { | 
 | 			rcu_read_unlock(); | 
 | 			return; | 
 | 		} | 
 |  | 
 | 		/* iterate each vlan, toggle vlan multicast context */ | 
 | 		list_for_each_entry_rcu(vlan, &vg->vlan_list, vlist) { | 
 | 			struct net_bridge_mcast_port *pmctx = | 
 | 						&vlan->port_mcast_ctx; | 
 | 			u8 state = br_vlan_get_state(vlan); | 
 | 			/* enable vlan multicast context when state is | 
 | 			 * LEARNING or FORWARDING | 
 | 			 */ | 
 | 			if (on && br_vlan_state_allowed(state, true)) | 
 | 				br_multicast_enable_port_ctx(pmctx); | 
 | 			else | 
 | 				br_multicast_disable_port_ctx(pmctx); | 
 | 		} | 
 | 		rcu_read_unlock(); | 
 | 		return; | 
 | 	} | 
 | #endif | 
 | 	/* toggle port multicast context when vlan snooping is disabled */ | 
 | 	if (on) | 
 | 		br_multicast_enable_port_ctx(&port->multicast_ctx); | 
 | 	else | 
 | 		br_multicast_disable_port_ctx(&port->multicast_ctx); | 
 | } | 
 |  | 
 | void br_multicast_enable_port(struct net_bridge_port *port) | 
 | { | 
 | 	br_multicast_toggle_port(port, true); | 
 | } | 
 |  | 
 | void br_multicast_disable_port(struct net_bridge_port *port) | 
 | { | 
 | 	br_multicast_toggle_port(port, false); | 
 | } | 
 |  | 
 | static int __grp_src_delete_marked(struct net_bridge_port_group *pg) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 | 	struct hlist_node *tmp; | 
 | 	int deleted = 0; | 
 |  | 
 | 	hlist_for_each_entry_safe(ent, tmp, &pg->src_list, node) | 
 | 		if (ent->flags & BR_SGRP_F_DELETE) { | 
 | 			br_multicast_del_group_src(ent, false); | 
 | 			deleted++; | 
 | 		} | 
 |  | 
 | 	return deleted; | 
 | } | 
 |  | 
 | static void __grp_src_mod_timer(struct net_bridge_group_src *src, | 
 | 				unsigned long expires) | 
 | { | 
 | 	mod_timer(&src->timer, expires); | 
 | 	br_multicast_fwd_src_handle(src); | 
 | } | 
 |  | 
 | static void __grp_src_query_marked_and_rexmit(struct net_bridge_mcast *brmctx, | 
 | 					      struct net_bridge_mcast_port *pmctx, | 
 | 					      struct net_bridge_port_group *pg) | 
 | { | 
 | 	struct bridge_mcast_other_query *other_query = NULL; | 
 | 	u32 lmqc = brmctx->multicast_last_member_count; | 
 | 	unsigned long lmqt, lmi, now = jiffies; | 
 | 	struct net_bridge_group_src *ent; | 
 |  | 
 | 	if (!netif_running(brmctx->br->dev) || | 
 | 	    !br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED)) | 
 | 		return; | 
 |  | 
 | 	if (pg->key.addr.proto == htons(ETH_P_IP)) | 
 | 		other_query = &brmctx->ip4_other_query; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	else | 
 | 		other_query = &brmctx->ip6_other_query; | 
 | #endif | 
 |  | 
 | 	lmqt = now + br_multicast_lmqt(brmctx); | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) { | 
 | 		if (ent->flags & BR_SGRP_F_SEND) { | 
 | 			ent->flags &= ~BR_SGRP_F_SEND; | 
 | 			if (ent->timer.expires > lmqt) { | 
 | 				if (brmctx->multicast_querier && | 
 | 				    other_query && | 
 | 				    !timer_pending(&other_query->timer)) | 
 | 					ent->src_query_rexmit_cnt = lmqc; | 
 | 				__grp_src_mod_timer(ent, lmqt); | 
 | 			} | 
 | 		} | 
 | 	} | 
 |  | 
 | 	if (!brmctx->multicast_querier || | 
 | 	    !other_query || timer_pending(&other_query->timer)) | 
 | 		return; | 
 |  | 
 | 	__br_multicast_send_query(brmctx, pmctx, pg, &pg->key.addr, | 
 | 				  &pg->key.addr, true, 1, NULL); | 
 |  | 
 | 	lmi = now + brmctx->multicast_last_member_interval; | 
 | 	if (!timer_pending(&pg->rexmit_timer) || | 
 | 	    time_after(pg->rexmit_timer.expires, lmi)) | 
 | 		mod_timer(&pg->rexmit_timer, lmi); | 
 | } | 
 |  | 
 | static void __grp_send_query_and_rexmit(struct net_bridge_mcast *brmctx, | 
 | 					struct net_bridge_mcast_port *pmctx, | 
 | 					struct net_bridge_port_group *pg) | 
 | { | 
 | 	struct bridge_mcast_other_query *other_query = NULL; | 
 | 	unsigned long now = jiffies, lmi; | 
 |  | 
 | 	if (!netif_running(brmctx->br->dev) || | 
 | 	    !br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED)) | 
 | 		return; | 
 |  | 
 | 	if (pg->key.addr.proto == htons(ETH_P_IP)) | 
 | 		other_query = &brmctx->ip4_other_query; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	else | 
 | 		other_query = &brmctx->ip6_other_query; | 
 | #endif | 
 |  | 
 | 	if (brmctx->multicast_querier && | 
 | 	    other_query && !timer_pending(&other_query->timer)) { | 
 | 		lmi = now + brmctx->multicast_last_member_interval; | 
 | 		pg->grp_query_rexmit_cnt = brmctx->multicast_last_member_count - 1; | 
 | 		__br_multicast_send_query(brmctx, pmctx, pg, &pg->key.addr, | 
 | 					  &pg->key.addr, false, 0, NULL); | 
 | 		if (!timer_pending(&pg->rexmit_timer) || | 
 | 		    time_after(pg->rexmit_timer.expires, lmi)) | 
 | 			mod_timer(&pg->rexmit_timer, lmi); | 
 | 	} | 
 |  | 
 | 	if (pg->filter_mode == MCAST_EXCLUDE && | 
 | 	    (!timer_pending(&pg->timer) || | 
 | 	     time_after(pg->timer.expires, now + br_multicast_lmqt(brmctx)))) | 
 | 		mod_timer(&pg->timer, now + br_multicast_lmqt(brmctx)); | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * INCLUDE (A)    IS_IN (B)     INCLUDE (A+B)            (B)=GMI | 
 |  * INCLUDE (A)    ALLOW (B)     INCLUDE (A+B)            (B)=GMI | 
 |  * EXCLUDE (X,Y)  ALLOW (A)     EXCLUDE (X+A,Y-A)        (A)=GMI | 
 |  */ | 
 | static bool br_multicast_isinc_allow(const struct net_bridge_mcast *brmctx, | 
 | 				     struct net_bridge_port_group *pg, void *h_addr, | 
 | 				     void *srcs, u32 nsrcs, size_t addr_size, | 
 | 				     int grec_type) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 | 	unsigned long now = jiffies; | 
 | 	bool changed = false; | 
 | 	struct br_ip src_ip; | 
 | 	u32 src_idx; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (!ent) { | 
 | 			ent = br_multicast_new_group_src(pg, &src_ip); | 
 | 			if (ent) | 
 | 				changed = true; | 
 | 		} | 
 |  | 
 | 		if (ent) | 
 | 			__grp_src_mod_timer(ent, now + br_multicast_gmi(brmctx)); | 
 | 	} | 
 |  | 
 | 	if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				    grec_type)) | 
 | 		changed = true; | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * INCLUDE (A)    IS_EX (B)     EXCLUDE (A*B,B-A)        (B-A)=0 | 
 |  *                                                       Delete (A-B) | 
 |  *                                                       Group Timer=GMI | 
 |  */ | 
 | static void __grp_src_isexc_incl(const struct net_bridge_mcast *brmctx, | 
 | 				 struct net_bridge_port_group *pg, void *h_addr, | 
 | 				 void *srcs, u32 nsrcs, size_t addr_size, | 
 | 				 int grec_type) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 | 	struct br_ip src_ip; | 
 | 	u32 src_idx; | 
 |  | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 		ent->flags |= BR_SGRP_F_DELETE; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (ent) | 
 | 			ent->flags &= ~BR_SGRP_F_DELETE; | 
 | 		else | 
 | 			ent = br_multicast_new_group_src(pg, &src_ip); | 
 | 		if (ent) | 
 | 			br_multicast_fwd_src_handle(ent); | 
 | 	} | 
 |  | 
 | 	br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				grec_type); | 
 |  | 
 | 	__grp_src_delete_marked(pg); | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * EXCLUDE (X,Y)  IS_EX (A)     EXCLUDE (A-Y,Y*A)        (A-X-Y)=GMI | 
 |  *                                                       Delete (X-A) | 
 |  *                                                       Delete (Y-A) | 
 |  *                                                       Group Timer=GMI | 
 |  */ | 
 | static bool __grp_src_isexc_excl(const struct net_bridge_mcast *brmctx, | 
 | 				 struct net_bridge_port_group *pg, void *h_addr, | 
 | 				 void *srcs, u32 nsrcs, size_t addr_size, | 
 | 				 int grec_type) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 | 	unsigned long now = jiffies; | 
 | 	bool changed = false; | 
 | 	struct br_ip src_ip; | 
 | 	u32 src_idx; | 
 |  | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 		ent->flags |= BR_SGRP_F_DELETE; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (ent) { | 
 | 			ent->flags &= ~BR_SGRP_F_DELETE; | 
 | 		} else { | 
 | 			ent = br_multicast_new_group_src(pg, &src_ip); | 
 | 			if (ent) { | 
 | 				__grp_src_mod_timer(ent, | 
 | 						    now + br_multicast_gmi(brmctx)); | 
 | 				changed = true; | 
 | 			} | 
 | 		} | 
 | 	} | 
 |  | 
 | 	if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				    grec_type)) | 
 | 		changed = true; | 
 |  | 
 | 	if (__grp_src_delete_marked(pg)) | 
 | 		changed = true; | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | static bool br_multicast_isexc(const struct net_bridge_mcast *brmctx, | 
 | 			       struct net_bridge_port_group *pg, void *h_addr, | 
 | 			       void *srcs, u32 nsrcs, size_t addr_size, | 
 | 			       int grec_type) | 
 | { | 
 | 	bool changed = false; | 
 |  | 
 | 	switch (pg->filter_mode) { | 
 | 	case MCAST_INCLUDE: | 
 | 		__grp_src_isexc_incl(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				     grec_type); | 
 | 		br_multicast_star_g_handle_mode(pg, MCAST_EXCLUDE); | 
 | 		changed = true; | 
 | 		break; | 
 | 	case MCAST_EXCLUDE: | 
 | 		changed = __grp_src_isexc_excl(brmctx, pg, h_addr, srcs, nsrcs, | 
 | 					       addr_size, grec_type); | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	pg->filter_mode = MCAST_EXCLUDE; | 
 | 	mod_timer(&pg->timer, jiffies + br_multicast_gmi(brmctx)); | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * INCLUDE (A)    TO_IN (B)     INCLUDE (A+B)            (B)=GMI | 
 |  *                                                       Send Q(G,A-B) | 
 |  */ | 
 | static bool __grp_src_toin_incl(struct net_bridge_mcast *brmctx, | 
 | 				struct net_bridge_mcast_port *pmctx, | 
 | 				struct net_bridge_port_group *pg, void *h_addr, | 
 | 				void *srcs, u32 nsrcs, size_t addr_size, | 
 | 				int grec_type) | 
 | { | 
 | 	u32 src_idx, to_send = pg->src_ents; | 
 | 	struct net_bridge_group_src *ent; | 
 | 	unsigned long now = jiffies; | 
 | 	bool changed = false; | 
 | 	struct br_ip src_ip; | 
 |  | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 		ent->flags |= BR_SGRP_F_SEND; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (ent) { | 
 | 			ent->flags &= ~BR_SGRP_F_SEND; | 
 | 			to_send--; | 
 | 		} else { | 
 | 			ent = br_multicast_new_group_src(pg, &src_ip); | 
 | 			if (ent) | 
 | 				changed = true; | 
 | 		} | 
 | 		if (ent) | 
 | 			__grp_src_mod_timer(ent, now + br_multicast_gmi(brmctx)); | 
 | 	} | 
 |  | 
 | 	if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				    grec_type)) | 
 | 		changed = true; | 
 |  | 
 | 	if (to_send) | 
 | 		__grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * EXCLUDE (X,Y)  TO_IN (A)     EXCLUDE (X+A,Y-A)        (A)=GMI | 
 |  *                                                       Send Q(G,X-A) | 
 |  *                                                       Send Q(G) | 
 |  */ | 
 | static bool __grp_src_toin_excl(struct net_bridge_mcast *brmctx, | 
 | 				struct net_bridge_mcast_port *pmctx, | 
 | 				struct net_bridge_port_group *pg, void *h_addr, | 
 | 				void *srcs, u32 nsrcs, size_t addr_size, | 
 | 				int grec_type) | 
 | { | 
 | 	u32 src_idx, to_send = pg->src_ents; | 
 | 	struct net_bridge_group_src *ent; | 
 | 	unsigned long now = jiffies; | 
 | 	bool changed = false; | 
 | 	struct br_ip src_ip; | 
 |  | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 		if (timer_pending(&ent->timer)) | 
 | 			ent->flags |= BR_SGRP_F_SEND; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (ent) { | 
 | 			if (timer_pending(&ent->timer)) { | 
 | 				ent->flags &= ~BR_SGRP_F_SEND; | 
 | 				to_send--; | 
 | 			} | 
 | 		} else { | 
 | 			ent = br_multicast_new_group_src(pg, &src_ip); | 
 | 			if (ent) | 
 | 				changed = true; | 
 | 		} | 
 | 		if (ent) | 
 | 			__grp_src_mod_timer(ent, now + br_multicast_gmi(brmctx)); | 
 | 	} | 
 |  | 
 | 	if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				    grec_type)) | 
 | 		changed = true; | 
 |  | 
 | 	if (to_send) | 
 | 		__grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); | 
 |  | 
 | 	__grp_send_query_and_rexmit(brmctx, pmctx, pg); | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | static bool br_multicast_toin(struct net_bridge_mcast *brmctx, | 
 | 			      struct net_bridge_mcast_port *pmctx, | 
 | 			      struct net_bridge_port_group *pg, void *h_addr, | 
 | 			      void *srcs, u32 nsrcs, size_t addr_size, | 
 | 			      int grec_type) | 
 | { | 
 | 	bool changed = false; | 
 |  | 
 | 	switch (pg->filter_mode) { | 
 | 	case MCAST_INCLUDE: | 
 | 		changed = __grp_src_toin_incl(brmctx, pmctx, pg, h_addr, srcs, | 
 | 					      nsrcs, addr_size, grec_type); | 
 | 		break; | 
 | 	case MCAST_EXCLUDE: | 
 | 		changed = __grp_src_toin_excl(brmctx, pmctx, pg, h_addr, srcs, | 
 | 					      nsrcs, addr_size, grec_type); | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	if (br_multicast_eht_should_del_pg(pg)) { | 
 | 		pg->flags |= MDB_PG_FLAGS_FAST_LEAVE; | 
 | 		br_multicast_find_del_pg(pg->key.port->br, pg); | 
 | 		/* a notification has already been sent and we shouldn't | 
 | 		 * access pg after the delete so we have to return false | 
 | 		 */ | 
 | 		changed = false; | 
 | 	} | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * INCLUDE (A)    TO_EX (B)     EXCLUDE (A*B,B-A)        (B-A)=0 | 
 |  *                                                       Delete (A-B) | 
 |  *                                                       Send Q(G,A*B) | 
 |  *                                                       Group Timer=GMI | 
 |  */ | 
 | static void __grp_src_toex_incl(struct net_bridge_mcast *brmctx, | 
 | 				struct net_bridge_mcast_port *pmctx, | 
 | 				struct net_bridge_port_group *pg, void *h_addr, | 
 | 				void *srcs, u32 nsrcs, size_t addr_size, | 
 | 				int grec_type) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 | 	u32 src_idx, to_send = 0; | 
 | 	struct br_ip src_ip; | 
 |  | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 		ent->flags = (ent->flags & ~BR_SGRP_F_SEND) | BR_SGRP_F_DELETE; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (ent) { | 
 | 			ent->flags = (ent->flags & ~BR_SGRP_F_DELETE) | | 
 | 				     BR_SGRP_F_SEND; | 
 | 			to_send++; | 
 | 		} else { | 
 | 			ent = br_multicast_new_group_src(pg, &src_ip); | 
 | 		} | 
 | 		if (ent) | 
 | 			br_multicast_fwd_src_handle(ent); | 
 | 	} | 
 |  | 
 | 	br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				grec_type); | 
 |  | 
 | 	__grp_src_delete_marked(pg); | 
 | 	if (to_send) | 
 | 		__grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * EXCLUDE (X,Y)  TO_EX (A)     EXCLUDE (A-Y,Y*A)        (A-X-Y)=Group Timer | 
 |  *                                                       Delete (X-A) | 
 |  *                                                       Delete (Y-A) | 
 |  *                                                       Send Q(G,A-Y) | 
 |  *                                                       Group Timer=GMI | 
 |  */ | 
 | static bool __grp_src_toex_excl(struct net_bridge_mcast *brmctx, | 
 | 				struct net_bridge_mcast_port *pmctx, | 
 | 				struct net_bridge_port_group *pg, void *h_addr, | 
 | 				void *srcs, u32 nsrcs, size_t addr_size, | 
 | 				int grec_type) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 | 	u32 src_idx, to_send = 0; | 
 | 	bool changed = false; | 
 | 	struct br_ip src_ip; | 
 |  | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 		ent->flags = (ent->flags & ~BR_SGRP_F_SEND) | BR_SGRP_F_DELETE; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (ent) { | 
 | 			ent->flags &= ~BR_SGRP_F_DELETE; | 
 | 		} else { | 
 | 			ent = br_multicast_new_group_src(pg, &src_ip); | 
 | 			if (ent) { | 
 | 				__grp_src_mod_timer(ent, pg->timer.expires); | 
 | 				changed = true; | 
 | 			} | 
 | 		} | 
 | 		if (ent && timer_pending(&ent->timer)) { | 
 | 			ent->flags |= BR_SGRP_F_SEND; | 
 | 			to_send++; | 
 | 		} | 
 | 	} | 
 |  | 
 | 	if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				    grec_type)) | 
 | 		changed = true; | 
 |  | 
 | 	if (__grp_src_delete_marked(pg)) | 
 | 		changed = true; | 
 | 	if (to_send) | 
 | 		__grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | static bool br_multicast_toex(struct net_bridge_mcast *brmctx, | 
 | 			      struct net_bridge_mcast_port *pmctx, | 
 | 			      struct net_bridge_port_group *pg, void *h_addr, | 
 | 			      void *srcs, u32 nsrcs, size_t addr_size, | 
 | 			      int grec_type) | 
 | { | 
 | 	bool changed = false; | 
 |  | 
 | 	switch (pg->filter_mode) { | 
 | 	case MCAST_INCLUDE: | 
 | 		__grp_src_toex_incl(brmctx, pmctx, pg, h_addr, srcs, nsrcs, | 
 | 				    addr_size, grec_type); | 
 | 		br_multicast_star_g_handle_mode(pg, MCAST_EXCLUDE); | 
 | 		changed = true; | 
 | 		break; | 
 | 	case MCAST_EXCLUDE: | 
 | 		changed = __grp_src_toex_excl(brmctx, pmctx, pg, h_addr, srcs, | 
 | 					      nsrcs, addr_size, grec_type); | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	pg->filter_mode = MCAST_EXCLUDE; | 
 | 	mod_timer(&pg->timer, jiffies + br_multicast_gmi(brmctx)); | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * INCLUDE (A)    BLOCK (B)     INCLUDE (A)              Send Q(G,A*B) | 
 |  */ | 
 | static bool __grp_src_block_incl(struct net_bridge_mcast *brmctx, | 
 | 				 struct net_bridge_mcast_port *pmctx, | 
 | 				 struct net_bridge_port_group *pg, void *h_addr, | 
 | 				 void *srcs, u32 nsrcs, size_t addr_size, int grec_type) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 | 	u32 src_idx, to_send = 0; | 
 | 	bool changed = false; | 
 | 	struct br_ip src_ip; | 
 |  | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 		ent->flags &= ~BR_SGRP_F_SEND; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (ent) { | 
 | 			ent->flags |= BR_SGRP_F_SEND; | 
 | 			to_send++; | 
 | 		} | 
 | 	} | 
 |  | 
 | 	if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				    grec_type)) | 
 | 		changed = true; | 
 |  | 
 | 	if (to_send) | 
 | 		__grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | /* State          Msg type      New state                Actions | 
 |  * EXCLUDE (X,Y)  BLOCK (A)     EXCLUDE (X+(A-Y),Y)      (A-X-Y)=Group Timer | 
 |  *                                                       Send Q(G,A-Y) | 
 |  */ | 
 | static bool __grp_src_block_excl(struct net_bridge_mcast *brmctx, | 
 | 				 struct net_bridge_mcast_port *pmctx, | 
 | 				 struct net_bridge_port_group *pg, void *h_addr, | 
 | 				 void *srcs, u32 nsrcs, size_t addr_size, int grec_type) | 
 | { | 
 | 	struct net_bridge_group_src *ent; | 
 | 	u32 src_idx, to_send = 0; | 
 | 	bool changed = false; | 
 | 	struct br_ip src_ip; | 
 |  | 
 | 	hlist_for_each_entry(ent, &pg->src_list, node) | 
 | 		ent->flags &= ~BR_SGRP_F_SEND; | 
 |  | 
 | 	memset(&src_ip, 0, sizeof(src_ip)); | 
 | 	src_ip.proto = pg->key.addr.proto; | 
 | 	for (src_idx = 0; src_idx < nsrcs; src_idx++) { | 
 | 		memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); | 
 | 		ent = br_multicast_find_group_src(pg, &src_ip); | 
 | 		if (!ent) { | 
 | 			ent = br_multicast_new_group_src(pg, &src_ip); | 
 | 			if (ent) { | 
 | 				__grp_src_mod_timer(ent, pg->timer.expires); | 
 | 				changed = true; | 
 | 			} | 
 | 		} | 
 | 		if (ent && timer_pending(&ent->timer)) { | 
 | 			ent->flags |= BR_SGRP_F_SEND; | 
 | 			to_send++; | 
 | 		} | 
 | 	} | 
 |  | 
 | 	if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, | 
 | 				    grec_type)) | 
 | 		changed = true; | 
 |  | 
 | 	if (to_send) | 
 | 		__grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | static bool br_multicast_block(struct net_bridge_mcast *brmctx, | 
 | 			       struct net_bridge_mcast_port *pmctx, | 
 | 			       struct net_bridge_port_group *pg, void *h_addr, | 
 | 			       void *srcs, u32 nsrcs, size_t addr_size, int grec_type) | 
 | { | 
 | 	bool changed = false; | 
 |  | 
 | 	switch (pg->filter_mode) { | 
 | 	case MCAST_INCLUDE: | 
 | 		changed = __grp_src_block_incl(brmctx, pmctx, pg, h_addr, srcs, | 
 | 					       nsrcs, addr_size, grec_type); | 
 | 		break; | 
 | 	case MCAST_EXCLUDE: | 
 | 		changed = __grp_src_block_excl(brmctx, pmctx, pg, h_addr, srcs, | 
 | 					       nsrcs, addr_size, grec_type); | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	if ((pg->filter_mode == MCAST_INCLUDE && hlist_empty(&pg->src_list)) || | 
 | 	    br_multicast_eht_should_del_pg(pg)) { | 
 | 		if (br_multicast_eht_should_del_pg(pg)) | 
 | 			pg->flags |= MDB_PG_FLAGS_FAST_LEAVE; | 
 | 		br_multicast_find_del_pg(pg->key.port->br, pg); | 
 | 		/* a notification has already been sent and we shouldn't | 
 | 		 * access pg after the delete so we have to return false | 
 | 		 */ | 
 | 		changed = false; | 
 | 	} | 
 |  | 
 | 	return changed; | 
 | } | 
 |  | 
 | static struct net_bridge_port_group * | 
 | br_multicast_find_port(struct net_bridge_mdb_entry *mp, | 
 | 		       struct net_bridge_port *p, | 
 | 		       const unsigned char *src) | 
 | { | 
 | 	struct net_bridge *br __maybe_unused = mp->br; | 
 | 	struct net_bridge_port_group *pg; | 
 |  | 
 | 	for (pg = mlock_dereference(mp->ports, br); | 
 | 	     pg; | 
 | 	     pg = mlock_dereference(pg->next, br)) | 
 | 		if (br_port_group_equal(pg, p, src)) | 
 | 			return pg; | 
 |  | 
 | 	return NULL; | 
 | } | 
 |  | 
 | static int br_ip4_multicast_igmp3_report(struct net_bridge_mcast *brmctx, | 
 | 					 struct net_bridge_mcast_port *pmctx, | 
 | 					 struct sk_buff *skb, | 
 | 					 u16 vid) | 
 | { | 
 | 	bool igmpv2 = brmctx->multicast_igmp_version == 2; | 
 | 	struct net_bridge_mdb_entry *mdst; | 
 | 	struct net_bridge_port_group *pg; | 
 | 	const unsigned char *src; | 
 | 	struct igmpv3_report *ih; | 
 | 	struct igmpv3_grec *grec; | 
 | 	int i, len, num, type; | 
 | 	__be32 group, *h_addr; | 
 | 	bool changed = false; | 
 | 	int err = 0; | 
 | 	u16 nsrcs; | 
 |  | 
 | 	ih = igmpv3_report_hdr(skb); | 
 | 	num = ntohs(ih->ngrec); | 
 | 	len = skb_transport_offset(skb) + sizeof(*ih); | 
 |  | 
 | 	for (i = 0; i < num; i++) { | 
 | 		len += sizeof(*grec); | 
 | 		if (!ip_mc_may_pull(skb, len)) | 
 | 			return -EINVAL; | 
 |  | 
 | 		grec = (void *)(skb->data + len - sizeof(*grec)); | 
 | 		group = grec->grec_mca; | 
 | 		type = grec->grec_type; | 
 | 		nsrcs = ntohs(grec->grec_nsrcs); | 
 |  | 
 | 		len += nsrcs * 4; | 
 | 		if (!ip_mc_may_pull(skb, len)) | 
 | 			return -EINVAL; | 
 |  | 
 | 		switch (type) { | 
 | 		case IGMPV3_MODE_IS_INCLUDE: | 
 | 		case IGMPV3_MODE_IS_EXCLUDE: | 
 | 		case IGMPV3_CHANGE_TO_INCLUDE: | 
 | 		case IGMPV3_CHANGE_TO_EXCLUDE: | 
 | 		case IGMPV3_ALLOW_NEW_SOURCES: | 
 | 		case IGMPV3_BLOCK_OLD_SOURCES: | 
 | 			break; | 
 |  | 
 | 		default: | 
 | 			continue; | 
 | 		} | 
 |  | 
 | 		src = eth_hdr(skb)->h_source; | 
 | 		if (nsrcs == 0 && | 
 | 		    (type == IGMPV3_CHANGE_TO_INCLUDE || | 
 | 		     type == IGMPV3_MODE_IS_INCLUDE)) { | 
 | 			if (!pmctx || igmpv2) { | 
 | 				br_ip4_multicast_leave_group(brmctx, pmctx, | 
 | 							     group, vid, src); | 
 | 				continue; | 
 | 			} | 
 | 		} else { | 
 | 			err = br_ip4_multicast_add_group(brmctx, pmctx, group, | 
 | 							 vid, src, igmpv2); | 
 | 			if (err) | 
 | 				break; | 
 | 		} | 
 |  | 
 | 		if (!pmctx || igmpv2) | 
 | 			continue; | 
 |  | 
 | 		spin_lock(&brmctx->br->multicast_lock); | 
 | 		if (!br_multicast_ctx_should_use(brmctx, pmctx)) | 
 | 			goto unlock_continue; | 
 |  | 
 | 		mdst = br_mdb_ip4_get(brmctx->br, group, vid); | 
 | 		if (!mdst) | 
 | 			goto unlock_continue; | 
 | 		pg = br_multicast_find_port(mdst, pmctx->port, src); | 
 | 		if (!pg || (pg->flags & MDB_PG_FLAGS_PERMANENT)) | 
 | 			goto unlock_continue; | 
 | 		/* reload grec and host addr */ | 
 | 		grec = (void *)(skb->data + len - sizeof(*grec) - (nsrcs * 4)); | 
 | 		h_addr = &ip_hdr(skb)->saddr; | 
 | 		switch (type) { | 
 | 		case IGMPV3_ALLOW_NEW_SOURCES: | 
 | 			changed = br_multicast_isinc_allow(brmctx, pg, h_addr, | 
 | 							   grec->grec_src, | 
 | 							   nsrcs, sizeof(__be32), type); | 
 | 			break; | 
 | 		case IGMPV3_MODE_IS_INCLUDE: | 
 | 			changed = br_multicast_isinc_allow(brmctx, pg, h_addr, | 
 | 							   grec->grec_src, | 
 | 							   nsrcs, sizeof(__be32), type); | 
 | 			break; | 
 | 		case IGMPV3_MODE_IS_EXCLUDE: | 
 | 			changed = br_multicast_isexc(brmctx, pg, h_addr, | 
 | 						     grec->grec_src, | 
 | 						     nsrcs, sizeof(__be32), type); | 
 | 			break; | 
 | 		case IGMPV3_CHANGE_TO_INCLUDE: | 
 | 			changed = br_multicast_toin(brmctx, pmctx, pg, h_addr, | 
 | 						    grec->grec_src, | 
 | 						    nsrcs, sizeof(__be32), type); | 
 | 			break; | 
 | 		case IGMPV3_CHANGE_TO_EXCLUDE: | 
 | 			changed = br_multicast_toex(brmctx, pmctx, pg, h_addr, | 
 | 						    grec->grec_src, | 
 | 						    nsrcs, sizeof(__be32), type); | 
 | 			break; | 
 | 		case IGMPV3_BLOCK_OLD_SOURCES: | 
 | 			changed = br_multicast_block(brmctx, pmctx, pg, h_addr, | 
 | 						     grec->grec_src, | 
 | 						     nsrcs, sizeof(__be32), type); | 
 | 			break; | 
 | 		} | 
 | 		if (changed) | 
 | 			br_mdb_notify(brmctx->br->dev, mdst, pg, RTM_NEWMDB); | 
 | unlock_continue: | 
 | 		spin_unlock(&brmctx->br->multicast_lock); | 
 | 	} | 
 |  | 
 | 	return err; | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static int br_ip6_multicast_mld2_report(struct net_bridge_mcast *brmctx, | 
 | 					struct net_bridge_mcast_port *pmctx, | 
 | 					struct sk_buff *skb, | 
 | 					u16 vid) | 
 | { | 
 | 	bool mldv1 = brmctx->multicast_mld_version == 1; | 
 | 	struct net_bridge_mdb_entry *mdst; | 
 | 	struct net_bridge_port_group *pg; | 
 | 	unsigned int nsrcs_offset; | 
 | 	struct mld2_report *mld2r; | 
 | 	const unsigned char *src; | 
 | 	struct in6_addr *h_addr; | 
 | 	struct mld2_grec *grec; | 
 | 	unsigned int grec_len; | 
 | 	bool changed = false; | 
 | 	int i, len, num; | 
 | 	int err = 0; | 
 |  | 
 | 	if (!ipv6_mc_may_pull(skb, sizeof(*mld2r))) | 
 | 		return -EINVAL; | 
 |  | 
 | 	mld2r = (struct mld2_report *)icmp6_hdr(skb); | 
 | 	num = ntohs(mld2r->mld2r_ngrec); | 
 | 	len = skb_transport_offset(skb) + sizeof(*mld2r); | 
 |  | 
 | 	for (i = 0; i < num; i++) { | 
 | 		__be16 *_nsrcs, __nsrcs; | 
 | 		u16 nsrcs; | 
 |  | 
 | 		nsrcs_offset = len + offsetof(struct mld2_grec, grec_nsrcs); | 
 |  | 
 | 		if (skb_transport_offset(skb) + ipv6_transport_len(skb) < | 
 | 		    nsrcs_offset + sizeof(__nsrcs)) | 
 | 			return -EINVAL; | 
 |  | 
 | 		_nsrcs = skb_header_pointer(skb, nsrcs_offset, | 
 | 					    sizeof(__nsrcs), &__nsrcs); | 
 | 		if (!_nsrcs) | 
 | 			return -EINVAL; | 
 |  | 
 | 		nsrcs = ntohs(*_nsrcs); | 
 | 		grec_len = struct_size(grec, grec_src, nsrcs); | 
 |  | 
 | 		if (!ipv6_mc_may_pull(skb, len + grec_len)) | 
 | 			return -EINVAL; | 
 |  | 
 | 		grec = (struct mld2_grec *)(skb->data + len); | 
 | 		len += grec_len; | 
 |  | 
 | 		switch (grec->grec_type) { | 
 | 		case MLD2_MODE_IS_INCLUDE: | 
 | 		case MLD2_MODE_IS_EXCLUDE: | 
 | 		case MLD2_CHANGE_TO_INCLUDE: | 
 | 		case MLD2_CHANGE_TO_EXCLUDE: | 
 | 		case MLD2_ALLOW_NEW_SOURCES: | 
 | 		case MLD2_BLOCK_OLD_SOURCES: | 
 | 			break; | 
 |  | 
 | 		default: | 
 | 			continue; | 
 | 		} | 
 |  | 
 | 		src = eth_hdr(skb)->h_source; | 
 | 		if ((grec->grec_type == MLD2_CHANGE_TO_INCLUDE || | 
 | 		     grec->grec_type == MLD2_MODE_IS_INCLUDE) && | 
 | 		    nsrcs == 0) { | 
 | 			if (!pmctx || mldv1) { | 
 | 				br_ip6_multicast_leave_group(brmctx, pmctx, | 
 | 							     &grec->grec_mca, | 
 | 							     vid, src); | 
 | 				continue; | 
 | 			} | 
 | 		} else { | 
 | 			err = br_ip6_multicast_add_group(brmctx, pmctx, | 
 | 							 &grec->grec_mca, vid, | 
 | 							 src, mldv1); | 
 | 			if (err) | 
 | 				break; | 
 | 		} | 
 |  | 
 | 		if (!pmctx || mldv1) | 
 | 			continue; | 
 |  | 
 | 		spin_lock(&brmctx->br->multicast_lock); | 
 | 		if (!br_multicast_ctx_should_use(brmctx, pmctx)) | 
 | 			goto unlock_continue; | 
 |  | 
 | 		mdst = br_mdb_ip6_get(brmctx->br, &grec->grec_mca, vid); | 
 | 		if (!mdst) | 
 | 			goto unlock_continue; | 
 | 		pg = br_multicast_find_port(mdst, pmctx->port, src); | 
 | 		if (!pg || (pg->flags & MDB_PG_FLAGS_PERMANENT)) | 
 | 			goto unlock_continue; | 
 | 		h_addr = &ipv6_hdr(skb)->saddr; | 
 | 		switch (grec->grec_type) { | 
 | 		case MLD2_ALLOW_NEW_SOURCES: | 
 | 			changed = br_multicast_isinc_allow(brmctx, pg, h_addr, | 
 | 							   grec->grec_src, nsrcs, | 
 | 							   sizeof(struct in6_addr), | 
 | 							   grec->grec_type); | 
 | 			break; | 
 | 		case MLD2_MODE_IS_INCLUDE: | 
 | 			changed = br_multicast_isinc_allow(brmctx, pg, h_addr, | 
 | 							   grec->grec_src, nsrcs, | 
 | 							   sizeof(struct in6_addr), | 
 | 							   grec->grec_type); | 
 | 			break; | 
 | 		case MLD2_MODE_IS_EXCLUDE: | 
 | 			changed = br_multicast_isexc(brmctx, pg, h_addr, | 
 | 						     grec->grec_src, nsrcs, | 
 | 						     sizeof(struct in6_addr), | 
 | 						     grec->grec_type); | 
 | 			break; | 
 | 		case MLD2_CHANGE_TO_INCLUDE: | 
 | 			changed = br_multicast_toin(brmctx, pmctx, pg, h_addr, | 
 | 						    grec->grec_src, nsrcs, | 
 | 						    sizeof(struct in6_addr), | 
 | 						    grec->grec_type); | 
 | 			break; | 
 | 		case MLD2_CHANGE_TO_EXCLUDE: | 
 | 			changed = br_multicast_toex(brmctx, pmctx, pg, h_addr, | 
 | 						    grec->grec_src, nsrcs, | 
 | 						    sizeof(struct in6_addr), | 
 | 						    grec->grec_type); | 
 | 			break; | 
 | 		case MLD2_BLOCK_OLD_SOURCES: | 
 | 			changed = br_multicast_block(brmctx, pmctx, pg, h_addr, | 
 | 						     grec->grec_src, nsrcs, | 
 | 						     sizeof(struct in6_addr), | 
 | 						     grec->grec_type); | 
 | 			break; | 
 | 		} | 
 | 		if (changed) | 
 | 			br_mdb_notify(brmctx->br->dev, mdst, pg, RTM_NEWMDB); | 
 | unlock_continue: | 
 | 		spin_unlock(&brmctx->br->multicast_lock); | 
 | 	} | 
 |  | 
 | 	return err; | 
 | } | 
 | #endif | 
 |  | 
 | static bool br_multicast_select_querier(struct net_bridge_mcast *brmctx, | 
 | 					struct net_bridge_mcast_port *pmctx, | 
 | 					struct br_ip *saddr) | 
 | { | 
 | 	int port_ifidx = pmctx ? pmctx->port->dev->ifindex : 0; | 
 | 	struct timer_list *own_timer, *other_timer; | 
 | 	struct bridge_mcast_querier *querier; | 
 |  | 
 | 	switch (saddr->proto) { | 
 | 	case htons(ETH_P_IP): | 
 | 		querier = &brmctx->ip4_querier; | 
 | 		own_timer = &brmctx->ip4_own_query.timer; | 
 | 		other_timer = &brmctx->ip4_other_query.timer; | 
 | 		if (!querier->addr.src.ip4 || | 
 | 		    ntohl(saddr->src.ip4) <= ntohl(querier->addr.src.ip4)) | 
 | 			goto update; | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case htons(ETH_P_IPV6): | 
 | 		querier = &brmctx->ip6_querier; | 
 | 		own_timer = &brmctx->ip6_own_query.timer; | 
 | 		other_timer = &brmctx->ip6_other_query.timer; | 
 | 		if (ipv6_addr_cmp(&saddr->src.ip6, &querier->addr.src.ip6) <= 0) | 
 | 			goto update; | 
 | 		break; | 
 | #endif | 
 | 	default: | 
 | 		return false; | 
 | 	} | 
 |  | 
 | 	if (!timer_pending(own_timer) && !timer_pending(other_timer)) | 
 | 		goto update; | 
 |  | 
 | 	return false; | 
 |  | 
 | update: | 
 | 	br_multicast_update_querier(brmctx, querier, port_ifidx, saddr); | 
 |  | 
 | 	return true; | 
 | } | 
 |  | 
 | static struct net_bridge_port * | 
 | __br_multicast_get_querier_port(struct net_bridge *br, | 
 | 				const struct bridge_mcast_querier *querier) | 
 | { | 
 | 	int port_ifidx = READ_ONCE(querier->port_ifidx); | 
 | 	struct net_bridge_port *p; | 
 | 	struct net_device *dev; | 
 |  | 
 | 	if (port_ifidx == 0) | 
 | 		return NULL; | 
 |  | 
 | 	dev = dev_get_by_index_rcu(dev_net(br->dev), port_ifidx); | 
 | 	if (!dev) | 
 | 		return NULL; | 
 | 	p = br_port_get_rtnl_rcu(dev); | 
 | 	if (!p || p->br != br) | 
 | 		return NULL; | 
 |  | 
 | 	return p; | 
 | } | 
 |  | 
 | size_t br_multicast_querier_state_size(void) | 
 | { | 
 | 	return nla_total_size(0) +		/* nest attribute */ | 
 | 	       nla_total_size(sizeof(__be32)) + /* BRIDGE_QUERIER_IP_ADDRESS */ | 
 | 	       nla_total_size(sizeof(int)) +    /* BRIDGE_QUERIER_IP_PORT */ | 
 | 	       nla_total_size_64bit(sizeof(u64)) + /* BRIDGE_QUERIER_IP_OTHER_TIMER */ | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	       nla_total_size(sizeof(struct in6_addr)) + /* BRIDGE_QUERIER_IPV6_ADDRESS */ | 
 | 	       nla_total_size(sizeof(int)) +		 /* BRIDGE_QUERIER_IPV6_PORT */ | 
 | 	       nla_total_size_64bit(sizeof(u64)) +	 /* BRIDGE_QUERIER_IPV6_OTHER_TIMER */ | 
 | #endif | 
 | 	       0; | 
 | } | 
 |  | 
 | /* protected by rtnl or rcu */ | 
 | int br_multicast_dump_querier_state(struct sk_buff *skb, | 
 | 				    const struct net_bridge_mcast *brmctx, | 
 | 				    int nest_attr) | 
 | { | 
 | 	struct bridge_mcast_querier querier = {}; | 
 | 	struct net_bridge_port *p; | 
 | 	struct nlattr *nest; | 
 |  | 
 | 	if (!br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED) || | 
 | 	    br_multicast_ctx_vlan_global_disabled(brmctx)) | 
 | 		return 0; | 
 |  | 
 | 	nest = nla_nest_start(skb, nest_attr); | 
 | 	if (!nest) | 
 | 		return -EMSGSIZE; | 
 |  | 
 | 	rcu_read_lock(); | 
 | 	if (!brmctx->multicast_querier && | 
 | 	    !timer_pending(&brmctx->ip4_other_query.timer)) | 
 | 		goto out_v6; | 
 |  | 
 | 	br_multicast_read_querier(&brmctx->ip4_querier, &querier); | 
 | 	if (nla_put_in_addr(skb, BRIDGE_QUERIER_IP_ADDRESS, | 
 | 			    querier.addr.src.ip4)) { | 
 | 		rcu_read_unlock(); | 
 | 		goto out_err; | 
 | 	} | 
 |  | 
 | 	p = __br_multicast_get_querier_port(brmctx->br, &querier); | 
 | 	if (timer_pending(&brmctx->ip4_other_query.timer) && | 
 | 	    (nla_put_u64_64bit(skb, BRIDGE_QUERIER_IP_OTHER_TIMER, | 
 | 			       br_timer_value(&brmctx->ip4_other_query.timer), | 
 | 			       BRIDGE_QUERIER_PAD) || | 
 | 	     (p && nla_put_u32(skb, BRIDGE_QUERIER_IP_PORT, p->dev->ifindex)))) { | 
 | 		rcu_read_unlock(); | 
 | 		goto out_err; | 
 | 	} | 
 |  | 
 | out_v6: | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	if (!brmctx->multicast_querier && | 
 | 	    !timer_pending(&brmctx->ip6_other_query.timer)) | 
 | 		goto out; | 
 |  | 
 | 	br_multicast_read_querier(&brmctx->ip6_querier, &querier); | 
 | 	if (nla_put_in6_addr(skb, BRIDGE_QUERIER_IPV6_ADDRESS, | 
 | 			     &querier.addr.src.ip6)) { | 
 | 		rcu_read_unlock(); | 
 | 		goto out_err; | 
 | 	} | 
 |  | 
 | 	p = __br_multicast_get_querier_port(brmctx->br, &querier); | 
 | 	if (timer_pending(&brmctx->ip6_other_query.timer) && | 
 | 	    (nla_put_u64_64bit(skb, BRIDGE_QUERIER_IPV6_OTHER_TIMER, | 
 | 			       br_timer_value(&brmctx->ip6_other_query.timer), | 
 | 			       BRIDGE_QUERIER_PAD) || | 
 | 	     (p && nla_put_u32(skb, BRIDGE_QUERIER_IPV6_PORT, | 
 | 			       p->dev->ifindex)))) { | 
 | 		rcu_read_unlock(); | 
 | 		goto out_err; | 
 | 	} | 
 | out: | 
 | #endif | 
 | 	rcu_read_unlock(); | 
 | 	nla_nest_end(skb, nest); | 
 | 	if (!nla_len(nest)) | 
 | 		nla_nest_cancel(skb, nest); | 
 |  | 
 | 	return 0; | 
 |  | 
 | out_err: | 
 | 	nla_nest_cancel(skb, nest); | 
 | 	return -EMSGSIZE; | 
 | } | 
 |  | 
 | static void | 
 | br_multicast_update_query_timer(struct net_bridge_mcast *brmctx, | 
 | 				struct bridge_mcast_other_query *query, | 
 | 				unsigned long max_delay) | 
 | { | 
 | 	if (!timer_pending(&query->timer)) | 
 | 		mod_timer(&query->delay_timer, jiffies + max_delay); | 
 |  | 
 | 	mod_timer(&query->timer, jiffies + brmctx->multicast_querier_interval); | 
 | } | 
 |  | 
 | static void br_port_mc_router_state_change(struct net_bridge_port *p, | 
 | 					   bool is_mc_router) | 
 | { | 
 | 	struct switchdev_attr attr = { | 
 | 		.orig_dev = p->dev, | 
 | 		.id = SWITCHDEV_ATTR_ID_PORT_MROUTER, | 
 | 		.flags = SWITCHDEV_F_DEFER, | 
 | 		.u.mrouter = is_mc_router, | 
 | 	}; | 
 |  | 
 | 	switchdev_port_attr_set(p->dev, &attr, NULL); | 
 | } | 
 |  | 
 | static struct net_bridge_port * | 
 | br_multicast_rport_from_node(struct net_bridge_mcast *brmctx, | 
 | 			     struct hlist_head *mc_router_list, | 
 | 			     struct hlist_node *rlist) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx; | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	if (mc_router_list == &brmctx->ip6_mc_router_list) | 
 | 		pmctx = hlist_entry(rlist, struct net_bridge_mcast_port, | 
 | 				    ip6_rlist); | 
 | 	else | 
 | #endif | 
 | 		pmctx = hlist_entry(rlist, struct net_bridge_mcast_port, | 
 | 				    ip4_rlist); | 
 |  | 
 | 	return pmctx->port; | 
 | } | 
 |  | 
 | static struct hlist_node * | 
 | br_multicast_get_rport_slot(struct net_bridge_mcast *brmctx, | 
 | 			    struct net_bridge_port *port, | 
 | 			    struct hlist_head *mc_router_list) | 
 |  | 
 | { | 
 | 	struct hlist_node *slot = NULL; | 
 | 	struct net_bridge_port *p; | 
 | 	struct hlist_node *rlist; | 
 |  | 
 | 	hlist_for_each(rlist, mc_router_list) { | 
 | 		p = br_multicast_rport_from_node(brmctx, mc_router_list, rlist); | 
 |  | 
 | 		if ((unsigned long)port >= (unsigned long)p) | 
 | 			break; | 
 |  | 
 | 		slot = rlist; | 
 | 	} | 
 |  | 
 | 	return slot; | 
 | } | 
 |  | 
 | static bool br_multicast_no_router_otherpf(struct net_bridge_mcast_port *pmctx, | 
 | 					   struct hlist_node *rnode) | 
 | { | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	if (rnode != &pmctx->ip6_rlist) | 
 | 		return hlist_unhashed(&pmctx->ip6_rlist); | 
 | 	else | 
 | 		return hlist_unhashed(&pmctx->ip4_rlist); | 
 | #else | 
 | 	return true; | 
 | #endif | 
 | } | 
 |  | 
 | /* Add port to router_list | 
 |  *  list is maintained ordered by pointer value | 
 |  *  and locked by br->multicast_lock and RCU | 
 |  */ | 
 | static void br_multicast_add_router(struct net_bridge_mcast *brmctx, | 
 | 				    struct net_bridge_mcast_port *pmctx, | 
 | 				    struct hlist_node *rlist, | 
 | 				    struct hlist_head *mc_router_list) | 
 | { | 
 | 	struct hlist_node *slot; | 
 |  | 
 | 	if (!hlist_unhashed(rlist)) | 
 | 		return; | 
 |  | 
 | 	slot = br_multicast_get_rport_slot(brmctx, pmctx->port, mc_router_list); | 
 |  | 
 | 	if (slot) | 
 | 		hlist_add_behind_rcu(rlist, slot); | 
 | 	else | 
 | 		hlist_add_head_rcu(rlist, mc_router_list); | 
 |  | 
 | 	/* For backwards compatibility for now, only notify if we | 
 | 	 * switched from no IPv4/IPv6 multicast router to a new | 
 | 	 * IPv4 or IPv6 multicast router. | 
 | 	 */ | 
 | 	if (br_multicast_no_router_otherpf(pmctx, rlist)) { | 
 | 		br_rtr_notify(pmctx->port->br->dev, pmctx, RTM_NEWMDB); | 
 | 		br_port_mc_router_state_change(pmctx->port, true); | 
 | 	} | 
 | } | 
 |  | 
 | /* Add port to router_list | 
 |  *  list is maintained ordered by pointer value | 
 |  *  and locked by br->multicast_lock and RCU | 
 |  */ | 
 | static void br_ip4_multicast_add_router(struct net_bridge_mcast *brmctx, | 
 | 					struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	br_multicast_add_router(brmctx, pmctx, &pmctx->ip4_rlist, | 
 | 				&brmctx->ip4_mc_router_list); | 
 | } | 
 |  | 
 | /* Add port to router_list | 
 |  *  list is maintained ordered by pointer value | 
 |  *  and locked by br->multicast_lock and RCU | 
 |  */ | 
 | static void br_ip6_multicast_add_router(struct net_bridge_mcast *brmctx, | 
 | 					struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	br_multicast_add_router(brmctx, pmctx, &pmctx->ip6_rlist, | 
 | 				&brmctx->ip6_mc_router_list); | 
 | #endif | 
 | } | 
 |  | 
 | static void br_multicast_mark_router(struct net_bridge_mcast *brmctx, | 
 | 				     struct net_bridge_mcast_port *pmctx, | 
 | 				     struct timer_list *timer, | 
 | 				     struct hlist_node *rlist, | 
 | 				     struct hlist_head *mc_router_list) | 
 | { | 
 | 	unsigned long now = jiffies; | 
 |  | 
 | 	if (!br_multicast_ctx_should_use(brmctx, pmctx)) | 
 | 		return; | 
 |  | 
 | 	if (!pmctx) { | 
 | 		if (brmctx->multicast_router == MDB_RTR_TYPE_TEMP_QUERY) { | 
 | 			if (!br_ip4_multicast_is_router(brmctx) && | 
 | 			    !br_ip6_multicast_is_router(brmctx)) | 
 | 				br_mc_router_state_change(brmctx->br, true); | 
 | 			mod_timer(timer, now + brmctx->multicast_querier_interval); | 
 | 		} | 
 | 		return; | 
 | 	} | 
 |  | 
 | 	if (pmctx->multicast_router == MDB_RTR_TYPE_DISABLED || | 
 | 	    pmctx->multicast_router == MDB_RTR_TYPE_PERM) | 
 | 		return; | 
 |  | 
 | 	br_multicast_add_router(brmctx, pmctx, rlist, mc_router_list); | 
 | 	mod_timer(timer, now + brmctx->multicast_querier_interval); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_mark_router(struct net_bridge_mcast *brmctx, | 
 | 					 struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | 	struct timer_list *timer = &brmctx->ip4_mc_router_timer; | 
 | 	struct hlist_node *rlist = NULL; | 
 |  | 
 | 	if (pmctx) { | 
 | 		timer = &pmctx->ip4_mc_router_timer; | 
 | 		rlist = &pmctx->ip4_rlist; | 
 | 	} | 
 |  | 
 | 	br_multicast_mark_router(brmctx, pmctx, timer, rlist, | 
 | 				 &brmctx->ip4_mc_router_list); | 
 | } | 
 |  | 
 | static void br_ip6_multicast_mark_router(struct net_bridge_mcast *brmctx, | 
 | 					 struct net_bridge_mcast_port *pmctx) | 
 | { | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	struct timer_list *timer = &brmctx->ip6_mc_router_timer; | 
 | 	struct hlist_node *rlist = NULL; | 
 |  | 
 | 	if (pmctx) { | 
 | 		timer = &pmctx->ip6_mc_router_timer; | 
 | 		rlist = &pmctx->ip6_rlist; | 
 | 	} | 
 |  | 
 | 	br_multicast_mark_router(brmctx, pmctx, timer, rlist, | 
 | 				 &brmctx->ip6_mc_router_list); | 
 | #endif | 
 | } | 
 |  | 
 | static void | 
 | br_ip4_multicast_query_received(struct net_bridge_mcast *brmctx, | 
 | 				struct net_bridge_mcast_port *pmctx, | 
 | 				struct bridge_mcast_other_query *query, | 
 | 				struct br_ip *saddr, | 
 | 				unsigned long max_delay) | 
 | { | 
 | 	if (!br_multicast_select_querier(brmctx, pmctx, saddr)) | 
 | 		return; | 
 |  | 
 | 	br_multicast_update_query_timer(brmctx, query, max_delay); | 
 | 	br_ip4_multicast_mark_router(brmctx, pmctx); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void | 
 | br_ip6_multicast_query_received(struct net_bridge_mcast *brmctx, | 
 | 				struct net_bridge_mcast_port *pmctx, | 
 | 				struct bridge_mcast_other_query *query, | 
 | 				struct br_ip *saddr, | 
 | 				unsigned long max_delay) | 
 | { | 
 | 	if (!br_multicast_select_querier(brmctx, pmctx, saddr)) | 
 | 		return; | 
 |  | 
 | 	br_multicast_update_query_timer(brmctx, query, max_delay); | 
 | 	br_ip6_multicast_mark_router(brmctx, pmctx); | 
 | } | 
 | #endif | 
 |  | 
 | static void br_ip4_multicast_query(struct net_bridge_mcast *brmctx, | 
 | 				   struct net_bridge_mcast_port *pmctx, | 
 | 				   struct sk_buff *skb, | 
 | 				   u16 vid) | 
 | { | 
 | 	unsigned int transport_len = ip_transport_len(skb); | 
 | 	const struct iphdr *iph = ip_hdr(skb); | 
 | 	struct igmphdr *ih = igmp_hdr(skb); | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	struct igmpv3_query *ih3; | 
 | 	struct net_bridge_port_group *p; | 
 | 	struct net_bridge_port_group __rcu **pp; | 
 | 	struct br_ip saddr = {}; | 
 | 	unsigned long max_delay; | 
 | 	unsigned long now = jiffies; | 
 | 	__be32 group; | 
 |  | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	if (!br_multicast_ctx_should_use(brmctx, pmctx)) | 
 | 		goto out; | 
 |  | 
 | 	group = ih->group; | 
 |  | 
 | 	if (transport_len == sizeof(*ih)) { | 
 | 		max_delay = ih->code * (HZ / IGMP_TIMER_SCALE); | 
 |  | 
 | 		if (!max_delay) { | 
 | 			max_delay = 10 * HZ; | 
 | 			group = 0; | 
 | 		} | 
 | 	} else if (transport_len >= sizeof(*ih3)) { | 
 | 		ih3 = igmpv3_query_hdr(skb); | 
 | 		if (ih3->nsrcs || | 
 | 		    (brmctx->multicast_igmp_version == 3 && group && | 
 | 		     ih3->suppress)) | 
 | 			goto out; | 
 |  | 
 | 		max_delay = ih3->code ? | 
 | 			    IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1; | 
 | 	} else { | 
 | 		goto out; | 
 | 	} | 
 |  | 
 | 	if (!group) { | 
 | 		saddr.proto = htons(ETH_P_IP); | 
 | 		saddr.src.ip4 = iph->saddr; | 
 |  | 
 | 		br_ip4_multicast_query_received(brmctx, pmctx, | 
 | 						&brmctx->ip4_other_query, | 
 | 						&saddr, max_delay); | 
 | 		goto out; | 
 | 	} | 
 |  | 
 | 	mp = br_mdb_ip4_get(brmctx->br, group, vid); | 
 | 	if (!mp) | 
 | 		goto out; | 
 |  | 
 | 	max_delay *= brmctx->multicast_last_member_count; | 
 |  | 
 | 	if (mp->host_joined && | 
 | 	    (timer_pending(&mp->timer) ? | 
 | 	     time_after(mp->timer.expires, now + max_delay) : | 
 | 	     timer_delete_sync_try(&mp->timer) >= 0)) | 
 | 		mod_timer(&mp->timer, now + max_delay); | 
 |  | 
 | 	for (pp = &mp->ports; | 
 | 	     (p = mlock_dereference(*pp, brmctx->br)) != NULL; | 
 | 	     pp = &p->next) { | 
 | 		if (timer_pending(&p->timer) ? | 
 | 		    time_after(p->timer.expires, now + max_delay) : | 
 | 		    timer_delete_sync_try(&p->timer) >= 0 && | 
 | 		    (brmctx->multicast_igmp_version == 2 || | 
 | 		     p->filter_mode == MCAST_EXCLUDE)) | 
 | 			mod_timer(&p->timer, now + max_delay); | 
 | 	} | 
 |  | 
 | out: | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static int br_ip6_multicast_query(struct net_bridge_mcast *brmctx, | 
 | 				  struct net_bridge_mcast_port *pmctx, | 
 | 				  struct sk_buff *skb, | 
 | 				  u16 vid) | 
 | { | 
 | 	unsigned int transport_len = ipv6_transport_len(skb); | 
 | 	struct mld_msg *mld; | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	struct mld2_query *mld2q; | 
 | 	struct net_bridge_port_group *p; | 
 | 	struct net_bridge_port_group __rcu **pp; | 
 | 	struct br_ip saddr = {}; | 
 | 	unsigned long max_delay; | 
 | 	unsigned long now = jiffies; | 
 | 	unsigned int offset = skb_transport_offset(skb); | 
 | 	const struct in6_addr *group = NULL; | 
 | 	bool is_general_query; | 
 | 	int err = 0; | 
 |  | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	if (!br_multicast_ctx_should_use(brmctx, pmctx)) | 
 | 		goto out; | 
 |  | 
 | 	if (transport_len == sizeof(*mld)) { | 
 | 		if (!pskb_may_pull(skb, offset + sizeof(*mld))) { | 
 | 			err = -EINVAL; | 
 | 			goto out; | 
 | 		} | 
 | 		mld = (struct mld_msg *) icmp6_hdr(skb); | 
 | 		max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay)); | 
 | 		if (max_delay) | 
 | 			group = &mld->mld_mca; | 
 | 	} else { | 
 | 		if (!pskb_may_pull(skb, offset + sizeof(*mld2q))) { | 
 | 			err = -EINVAL; | 
 | 			goto out; | 
 | 		} | 
 | 		mld2q = (struct mld2_query *)icmp6_hdr(skb); | 
 | 		if (!mld2q->mld2q_nsrcs) | 
 | 			group = &mld2q->mld2q_mca; | 
 | 		if (brmctx->multicast_mld_version == 2 && | 
 | 		    !ipv6_addr_any(&mld2q->mld2q_mca) && | 
 | 		    mld2q->mld2q_suppress) | 
 | 			goto out; | 
 |  | 
 | 		max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL); | 
 | 	} | 
 |  | 
 | 	is_general_query = group && ipv6_addr_any(group); | 
 |  | 
 | 	if (is_general_query) { | 
 | 		saddr.proto = htons(ETH_P_IPV6); | 
 | 		saddr.src.ip6 = ipv6_hdr(skb)->saddr; | 
 |  | 
 | 		br_ip6_multicast_query_received(brmctx, pmctx, | 
 | 						&brmctx->ip6_other_query, | 
 | 						&saddr, max_delay); | 
 | 		goto out; | 
 | 	} else if (!group) { | 
 | 		goto out; | 
 | 	} | 
 |  | 
 | 	mp = br_mdb_ip6_get(brmctx->br, group, vid); | 
 | 	if (!mp) | 
 | 		goto out; | 
 |  | 
 | 	max_delay *= brmctx->multicast_last_member_count; | 
 | 	if (mp->host_joined && | 
 | 	    (timer_pending(&mp->timer) ? | 
 | 	     time_after(mp->timer.expires, now + max_delay) : | 
 | 	     timer_delete_sync_try(&mp->timer) >= 0)) | 
 | 		mod_timer(&mp->timer, now + max_delay); | 
 |  | 
 | 	for (pp = &mp->ports; | 
 | 	     (p = mlock_dereference(*pp, brmctx->br)) != NULL; | 
 | 	     pp = &p->next) { | 
 | 		if (timer_pending(&p->timer) ? | 
 | 		    time_after(p->timer.expires, now + max_delay) : | 
 | 		    timer_delete_sync_try(&p->timer) >= 0 && | 
 | 		    (brmctx->multicast_mld_version == 1 || | 
 | 		     p->filter_mode == MCAST_EXCLUDE)) | 
 | 			mod_timer(&p->timer, now + max_delay); | 
 | 	} | 
 |  | 
 | out: | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 | 	return err; | 
 | } | 
 | #endif | 
 |  | 
 | static void | 
 | br_multicast_leave_group(struct net_bridge_mcast *brmctx, | 
 | 			 struct net_bridge_mcast_port *pmctx, | 
 | 			 struct br_ip *group, | 
 | 			 struct bridge_mcast_other_query *other_query, | 
 | 			 struct bridge_mcast_own_query *own_query, | 
 | 			 const unsigned char *src) | 
 | { | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	struct net_bridge_port_group *p; | 
 | 	unsigned long now; | 
 | 	unsigned long time; | 
 |  | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	if (!br_multicast_ctx_should_use(brmctx, pmctx)) | 
 | 		goto out; | 
 |  | 
 | 	mp = br_mdb_ip_get(brmctx->br, group); | 
 | 	if (!mp) | 
 | 		goto out; | 
 |  | 
 | 	if (pmctx && (pmctx->port->flags & BR_MULTICAST_FAST_LEAVE)) { | 
 | 		struct net_bridge_port_group __rcu **pp; | 
 |  | 
 | 		for (pp = &mp->ports; | 
 | 		     (p = mlock_dereference(*pp, brmctx->br)) != NULL; | 
 | 		     pp = &p->next) { | 
 | 			if (!br_port_group_equal(p, pmctx->port, src)) | 
 | 				continue; | 
 |  | 
 | 			if (p->flags & MDB_PG_FLAGS_PERMANENT) | 
 | 				break; | 
 |  | 
 | 			p->flags |= MDB_PG_FLAGS_FAST_LEAVE; | 
 | 			br_multicast_del_pg(mp, p, pp); | 
 | 		} | 
 | 		goto out; | 
 | 	} | 
 |  | 
 | 	if (timer_pending(&other_query->timer)) | 
 | 		goto out; | 
 |  | 
 | 	if (brmctx->multicast_querier) { | 
 | 		__br_multicast_send_query(brmctx, pmctx, NULL, NULL, &mp->addr, | 
 | 					  false, 0, NULL); | 
 |  | 
 | 		time = jiffies + brmctx->multicast_last_member_count * | 
 | 				 brmctx->multicast_last_member_interval; | 
 |  | 
 | 		mod_timer(&own_query->timer, time); | 
 |  | 
 | 		for (p = mlock_dereference(mp->ports, brmctx->br); | 
 | 		     p != NULL && pmctx != NULL; | 
 | 		     p = mlock_dereference(p->next, brmctx->br)) { | 
 | 			if (!br_port_group_equal(p, pmctx->port, src)) | 
 | 				continue; | 
 |  | 
 | 			if (!hlist_unhashed(&p->mglist) && | 
 | 			    (timer_pending(&p->timer) ? | 
 | 			     time_after(p->timer.expires, time) : | 
 | 			     timer_delete_sync_try(&p->timer) >= 0)) { | 
 | 				mod_timer(&p->timer, time); | 
 | 			} | 
 |  | 
 | 			break; | 
 | 		} | 
 | 	} | 
 |  | 
 | 	now = jiffies; | 
 | 	time = now + brmctx->multicast_last_member_count * | 
 | 		     brmctx->multicast_last_member_interval; | 
 |  | 
 | 	if (!pmctx) { | 
 | 		if (mp->host_joined && | 
 | 		    (timer_pending(&mp->timer) ? | 
 | 		     time_after(mp->timer.expires, time) : | 
 | 		     timer_delete_sync_try(&mp->timer) >= 0)) { | 
 | 			mod_timer(&mp->timer, time); | 
 | 		} | 
 |  | 
 | 		goto out; | 
 | 	} | 
 |  | 
 | 	for (p = mlock_dereference(mp->ports, brmctx->br); | 
 | 	     p != NULL; | 
 | 	     p = mlock_dereference(p->next, brmctx->br)) { | 
 | 		if (p->key.port != pmctx->port) | 
 | 			continue; | 
 |  | 
 | 		if (!hlist_unhashed(&p->mglist) && | 
 | 		    (timer_pending(&p->timer) ? | 
 | 		     time_after(p->timer.expires, time) : | 
 | 		     timer_delete_sync_try(&p->timer) >= 0)) { | 
 | 			mod_timer(&p->timer, time); | 
 | 		} | 
 |  | 
 | 		break; | 
 | 	} | 
 | out: | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_leave_group(struct net_bridge_mcast *brmctx, | 
 | 					 struct net_bridge_mcast_port *pmctx, | 
 | 					 __be32 group, | 
 | 					 __u16 vid, | 
 | 					 const unsigned char *src) | 
 | { | 
 | 	struct br_ip br_group; | 
 | 	struct bridge_mcast_own_query *own_query; | 
 |  | 
 | 	if (ipv4_is_local_multicast(group)) | 
 | 		return; | 
 |  | 
 | 	own_query = pmctx ? &pmctx->ip4_own_query : &brmctx->ip4_own_query; | 
 |  | 
 | 	memset(&br_group, 0, sizeof(br_group)); | 
 | 	br_group.dst.ip4 = group; | 
 | 	br_group.proto = htons(ETH_P_IP); | 
 | 	br_group.vid = vid; | 
 |  | 
 | 	br_multicast_leave_group(brmctx, pmctx, &br_group, | 
 | 				 &brmctx->ip4_other_query, | 
 | 				 own_query, src); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_leave_group(struct net_bridge_mcast *brmctx, | 
 | 					 struct net_bridge_mcast_port *pmctx, | 
 | 					 const struct in6_addr *group, | 
 | 					 __u16 vid, | 
 | 					 const unsigned char *src) | 
 | { | 
 | 	struct br_ip br_group; | 
 | 	struct bridge_mcast_own_query *own_query; | 
 |  | 
 | 	if (ipv6_addr_is_ll_all_nodes(group)) | 
 | 		return; | 
 |  | 
 | 	own_query = pmctx ? &pmctx->ip6_own_query : &brmctx->ip6_own_query; | 
 |  | 
 | 	memset(&br_group, 0, sizeof(br_group)); | 
 | 	br_group.dst.ip6 = *group; | 
 | 	br_group.proto = htons(ETH_P_IPV6); | 
 | 	br_group.vid = vid; | 
 |  | 
 | 	br_multicast_leave_group(brmctx, pmctx, &br_group, | 
 | 				 &brmctx->ip6_other_query, | 
 | 				 own_query, src); | 
 | } | 
 | #endif | 
 |  | 
 | static void br_multicast_err_count(const struct net_bridge *br, | 
 | 				   const struct net_bridge_port *p, | 
 | 				   __be16 proto) | 
 | { | 
 | 	struct bridge_mcast_stats __percpu *stats; | 
 | 	struct bridge_mcast_stats *pstats; | 
 |  | 
 | 	if (!br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED)) | 
 | 		return; | 
 |  | 
 | 	if (p) | 
 | 		stats = p->mcast_stats; | 
 | 	else | 
 | 		stats = br->mcast_stats; | 
 | 	if (WARN_ON(!stats)) | 
 | 		return; | 
 |  | 
 | 	pstats = this_cpu_ptr(stats); | 
 |  | 
 | 	u64_stats_update_begin(&pstats->syncp); | 
 | 	switch (proto) { | 
 | 	case htons(ETH_P_IP): | 
 | 		pstats->mstats.igmp_parse_errors++; | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case htons(ETH_P_IPV6): | 
 | 		pstats->mstats.mld_parse_errors++; | 
 | 		break; | 
 | #endif | 
 | 	} | 
 | 	u64_stats_update_end(&pstats->syncp); | 
 | } | 
 |  | 
 | static void br_multicast_pim(struct net_bridge_mcast *brmctx, | 
 | 			     struct net_bridge_mcast_port *pmctx, | 
 | 			     const struct sk_buff *skb) | 
 | { | 
 | 	unsigned int offset = skb_transport_offset(skb); | 
 | 	struct pimhdr *pimhdr, _pimhdr; | 
 |  | 
 | 	pimhdr = skb_header_pointer(skb, offset, sizeof(_pimhdr), &_pimhdr); | 
 | 	if (!pimhdr || pim_hdr_version(pimhdr) != PIM_VERSION || | 
 | 	    pim_hdr_type(pimhdr) != PIM_TYPE_HELLO) | 
 | 		return; | 
 |  | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	br_ip4_multicast_mark_router(brmctx, pmctx); | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 | } | 
 |  | 
 | static int br_ip4_multicast_mrd_rcv(struct net_bridge_mcast *brmctx, | 
 | 				    struct net_bridge_mcast_port *pmctx, | 
 | 				    struct sk_buff *skb) | 
 | { | 
 | 	if (ip_hdr(skb)->protocol != IPPROTO_IGMP || | 
 | 	    igmp_hdr(skb)->type != IGMP_MRDISC_ADV) | 
 | 		return -ENOMSG; | 
 |  | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	br_ip4_multicast_mark_router(brmctx, pmctx); | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | static int br_multicast_ipv4_rcv(struct net_bridge_mcast *brmctx, | 
 | 				 struct net_bridge_mcast_port *pmctx, | 
 | 				 struct sk_buff *skb, | 
 | 				 u16 vid) | 
 | { | 
 | 	struct net_bridge_port *p = pmctx ? pmctx->port : NULL; | 
 | 	const unsigned char *src; | 
 | 	struct igmphdr *ih; | 
 | 	int err; | 
 |  | 
 | 	err = ip_mc_check_igmp(skb); | 
 |  | 
 | 	if (err == -ENOMSG) { | 
 | 		if (!ipv4_is_local_multicast(ip_hdr(skb)->daddr)) { | 
 | 			BR_INPUT_SKB_CB(skb)->mrouters_only = 1; | 
 | 		} else if (pim_ipv4_all_pim_routers(ip_hdr(skb)->daddr)) { | 
 | 			if (ip_hdr(skb)->protocol == IPPROTO_PIM) | 
 | 				br_multicast_pim(brmctx, pmctx, skb); | 
 | 		} else if (ipv4_is_all_snoopers(ip_hdr(skb)->daddr)) { | 
 | 			br_ip4_multicast_mrd_rcv(brmctx, pmctx, skb); | 
 | 		} | 
 |  | 
 | 		return 0; | 
 | 	} else if (err < 0) { | 
 | 		br_multicast_err_count(brmctx->br, p, skb->protocol); | 
 | 		return err; | 
 | 	} | 
 |  | 
 | 	ih = igmp_hdr(skb); | 
 | 	src = eth_hdr(skb)->h_source; | 
 | 	BR_INPUT_SKB_CB(skb)->igmp = ih->type; | 
 |  | 
 | 	switch (ih->type) { | 
 | 	case IGMP_HOST_MEMBERSHIP_REPORT: | 
 | 	case IGMPV2_HOST_MEMBERSHIP_REPORT: | 
 | 		BR_INPUT_SKB_CB(skb)->mrouters_only = 1; | 
 | 		err = br_ip4_multicast_add_group(brmctx, pmctx, ih->group, vid, | 
 | 						 src, true); | 
 | 		break; | 
 | 	case IGMPV3_HOST_MEMBERSHIP_REPORT: | 
 | 		err = br_ip4_multicast_igmp3_report(brmctx, pmctx, skb, vid); | 
 | 		break; | 
 | 	case IGMP_HOST_MEMBERSHIP_QUERY: | 
 | 		br_ip4_multicast_query(brmctx, pmctx, skb, vid); | 
 | 		break; | 
 | 	case IGMP_HOST_LEAVE_MESSAGE: | 
 | 		br_ip4_multicast_leave_group(brmctx, pmctx, ih->group, vid, src); | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	br_multicast_count(brmctx->br, p, skb, BR_INPUT_SKB_CB(skb)->igmp, | 
 | 			   BR_MCAST_DIR_RX); | 
 |  | 
 | 	return err; | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_mrd_rcv(struct net_bridge_mcast *brmctx, | 
 | 				     struct net_bridge_mcast_port *pmctx, | 
 | 				     struct sk_buff *skb) | 
 | { | 
 | 	if (icmp6_hdr(skb)->icmp6_type != ICMPV6_MRDISC_ADV) | 
 | 		return; | 
 |  | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	br_ip6_multicast_mark_router(brmctx, pmctx); | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 | } | 
 |  | 
 | static int br_multicast_ipv6_rcv(struct net_bridge_mcast *brmctx, | 
 | 				 struct net_bridge_mcast_port *pmctx, | 
 | 				 struct sk_buff *skb, | 
 | 				 u16 vid) | 
 | { | 
 | 	struct net_bridge_port *p = pmctx ? pmctx->port : NULL; | 
 | 	const unsigned char *src; | 
 | 	struct mld_msg *mld; | 
 | 	int err; | 
 |  | 
 | 	err = ipv6_mc_check_mld(skb); | 
 |  | 
 | 	if (err == -ENOMSG || err == -ENODATA) { | 
 | 		if (!ipv6_addr_is_ll_all_nodes(&ipv6_hdr(skb)->daddr)) | 
 | 			BR_INPUT_SKB_CB(skb)->mrouters_only = 1; | 
 | 		if (err == -ENODATA && | 
 | 		    ipv6_addr_is_all_snoopers(&ipv6_hdr(skb)->daddr)) | 
 | 			br_ip6_multicast_mrd_rcv(brmctx, pmctx, skb); | 
 |  | 
 | 		return 0; | 
 | 	} else if (err < 0) { | 
 | 		br_multicast_err_count(brmctx->br, p, skb->protocol); | 
 | 		return err; | 
 | 	} | 
 |  | 
 | 	mld = (struct mld_msg *)skb_transport_header(skb); | 
 | 	BR_INPUT_SKB_CB(skb)->igmp = mld->mld_type; | 
 |  | 
 | 	switch (mld->mld_type) { | 
 | 	case ICMPV6_MGM_REPORT: | 
 | 		src = eth_hdr(skb)->h_source; | 
 | 		BR_INPUT_SKB_CB(skb)->mrouters_only = 1; | 
 | 		err = br_ip6_multicast_add_group(brmctx, pmctx, &mld->mld_mca, | 
 | 						 vid, src, true); | 
 | 		break; | 
 | 	case ICMPV6_MLD2_REPORT: | 
 | 		err = br_ip6_multicast_mld2_report(brmctx, pmctx, skb, vid); | 
 | 		break; | 
 | 	case ICMPV6_MGM_QUERY: | 
 | 		err = br_ip6_multicast_query(brmctx, pmctx, skb, vid); | 
 | 		break; | 
 | 	case ICMPV6_MGM_REDUCTION: | 
 | 		src = eth_hdr(skb)->h_source; | 
 | 		br_ip6_multicast_leave_group(brmctx, pmctx, &mld->mld_mca, vid, | 
 | 					     src); | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	br_multicast_count(brmctx->br, p, skb, BR_INPUT_SKB_CB(skb)->igmp, | 
 | 			   BR_MCAST_DIR_RX); | 
 |  | 
 | 	return err; | 
 | } | 
 | #endif | 
 |  | 
 | int br_multicast_rcv(struct net_bridge_mcast **brmctx, | 
 | 		     struct net_bridge_mcast_port **pmctx, | 
 | 		     struct net_bridge_vlan *vlan, | 
 | 		     struct sk_buff *skb, u16 vid) | 
 | { | 
 | 	int ret = 0; | 
 |  | 
 | 	BR_INPUT_SKB_CB(skb)->igmp = 0; | 
 | 	BR_INPUT_SKB_CB(skb)->mrouters_only = 0; | 
 |  | 
 | 	if (!br_opt_get((*brmctx)->br, BROPT_MULTICAST_ENABLED)) | 
 | 		return 0; | 
 |  | 
 | 	if (br_opt_get((*brmctx)->br, BROPT_MCAST_VLAN_SNOOPING_ENABLED) && vlan) { | 
 | 		const struct net_bridge_vlan *masterv; | 
 |  | 
 | 		/* the vlan has the master flag set only when transmitting | 
 | 		 * through the bridge device | 
 | 		 */ | 
 | 		if (br_vlan_is_master(vlan)) { | 
 | 			masterv = vlan; | 
 | 			*brmctx = &vlan->br_mcast_ctx; | 
 | 			*pmctx = NULL; | 
 | 		} else { | 
 | 			masterv = vlan->brvlan; | 
 | 			*brmctx = &vlan->brvlan->br_mcast_ctx; | 
 | 			*pmctx = &vlan->port_mcast_ctx; | 
 | 		} | 
 |  | 
 | 		if (!(masterv->priv_flags & BR_VLFLAG_GLOBAL_MCAST_ENABLED)) | 
 | 			return 0; | 
 | 	} | 
 |  | 
 | 	switch (skb->protocol) { | 
 | 	case htons(ETH_P_IP): | 
 | 		ret = br_multicast_ipv4_rcv(*brmctx, *pmctx, skb, vid); | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case htons(ETH_P_IPV6): | 
 | 		ret = br_multicast_ipv6_rcv(*brmctx, *pmctx, skb, vid); | 
 | 		break; | 
 | #endif | 
 | 	} | 
 |  | 
 | 	return ret; | 
 | } | 
 |  | 
 | static void br_multicast_query_expired(struct net_bridge_mcast *brmctx, | 
 | 				       struct bridge_mcast_own_query *query, | 
 | 				       struct bridge_mcast_querier *querier) | 
 | { | 
 | 	spin_lock(&brmctx->br->multicast_lock); | 
 | 	if (br_multicast_ctx_vlan_disabled(brmctx)) | 
 | 		goto out; | 
 |  | 
 | 	if (query->startup_sent < brmctx->multicast_startup_query_count) | 
 | 		query->startup_sent++; | 
 |  | 
 | 	br_multicast_send_query(brmctx, NULL, query); | 
 | out: | 
 | 	spin_unlock(&brmctx->br->multicast_lock); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_query_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast *brmctx = timer_container_of(brmctx, t, | 
 | 							     ip4_own_query.timer); | 
 |  | 
 | 	br_multicast_query_expired(brmctx, &brmctx->ip4_own_query, | 
 | 				   &brmctx->ip4_querier); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_query_expired(struct timer_list *t) | 
 | { | 
 | 	struct net_bridge_mcast *brmctx = timer_container_of(brmctx, t, | 
 | 							     ip6_own_query.timer); | 
 |  | 
 | 	br_multicast_query_expired(brmctx, &brmctx->ip6_own_query, | 
 | 				   &brmctx->ip6_querier); | 
 | } | 
 | #endif | 
 |  | 
 | static void br_multicast_gc_work(struct work_struct *work) | 
 | { | 
 | 	struct net_bridge *br = container_of(work, struct net_bridge, | 
 | 					     mcast_gc_work); | 
 | 	HLIST_HEAD(deleted_head); | 
 |  | 
 | 	spin_lock_bh(&br->multicast_lock); | 
 | 	hlist_move_list(&br->mcast_gc_list, &deleted_head); | 
 | 	spin_unlock_bh(&br->multicast_lock); | 
 |  | 
 | 	br_multicast_gc(&deleted_head); | 
 | } | 
 |  | 
 | void br_multicast_ctx_init(struct net_bridge *br, | 
 | 			   struct net_bridge_vlan *vlan, | 
 | 			   struct net_bridge_mcast *brmctx) | 
 | { | 
 | 	brmctx->br = br; | 
 | 	brmctx->vlan = vlan; | 
 | 	brmctx->multicast_router = MDB_RTR_TYPE_TEMP_QUERY; | 
 | 	brmctx->multicast_last_member_count = 2; | 
 | 	brmctx->multicast_startup_query_count = 2; | 
 |  | 
 | 	brmctx->multicast_last_member_interval = HZ; | 
 | 	brmctx->multicast_query_response_interval = 10 * HZ; | 
 | 	brmctx->multicast_startup_query_interval = 125 * HZ / 4; | 
 | 	brmctx->multicast_query_interval = 125 * HZ; | 
 | 	brmctx->multicast_querier_interval = 255 * HZ; | 
 | 	brmctx->multicast_membership_interval = 260 * HZ; | 
 |  | 
 | 	brmctx->ip4_querier.port_ifidx = 0; | 
 | 	seqcount_spinlock_init(&brmctx->ip4_querier.seq, &br->multicast_lock); | 
 | 	brmctx->multicast_igmp_version = 2; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	brmctx->multicast_mld_version = 1; | 
 | 	brmctx->ip6_querier.port_ifidx = 0; | 
 | 	seqcount_spinlock_init(&brmctx->ip6_querier.seq, &br->multicast_lock); | 
 | #endif | 
 |  | 
 | 	timer_setup(&brmctx->ip4_mc_router_timer, | 
 | 		    br_ip4_multicast_local_router_expired, 0); | 
 | 	timer_setup(&brmctx->ip4_other_query.timer, | 
 | 		    br_ip4_multicast_querier_expired, 0); | 
 | 	timer_setup(&brmctx->ip4_other_query.delay_timer, | 
 | 		    br_multicast_query_delay_expired, 0); | 
 | 	timer_setup(&brmctx->ip4_own_query.timer, | 
 | 		    br_ip4_multicast_query_expired, 0); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	timer_setup(&brmctx->ip6_mc_router_timer, | 
 | 		    br_ip6_multicast_local_router_expired, 0); | 
 | 	timer_setup(&brmctx->ip6_other_query.timer, | 
 | 		    br_ip6_multicast_querier_expired, 0); | 
 | 	timer_setup(&brmctx->ip6_other_query.delay_timer, | 
 | 		    br_multicast_query_delay_expired, 0); | 
 | 	timer_setup(&brmctx->ip6_own_query.timer, | 
 | 		    br_ip6_multicast_query_expired, 0); | 
 | #endif | 
 | } | 
 |  | 
 | void br_multicast_ctx_deinit(struct net_bridge_mcast *brmctx) | 
 | { | 
 | 	__br_multicast_stop(brmctx); | 
 | } | 
 |  | 
 | void br_multicast_init(struct net_bridge *br) | 
 | { | 
 | 	br->hash_max = BR_MULTICAST_DEFAULT_HASH_MAX; | 
 |  | 
 | 	br_multicast_ctx_init(br, NULL, &br->multicast_ctx); | 
 |  | 
 | 	br_opt_toggle(br, BROPT_MULTICAST_ENABLED, true); | 
 | 	br_opt_toggle(br, BROPT_HAS_IPV6_ADDR, true); | 
 |  | 
 | 	spin_lock_init(&br->multicast_lock); | 
 | 	INIT_HLIST_HEAD(&br->mdb_list); | 
 | 	INIT_HLIST_HEAD(&br->mcast_gc_list); | 
 | 	INIT_WORK(&br->mcast_gc_work, br_multicast_gc_work); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_join_snoopers(struct net_bridge *br) | 
 | { | 
 | 	struct in_device *in_dev = in_dev_get(br->dev); | 
 |  | 
 | 	if (!in_dev) | 
 | 		return; | 
 |  | 
 | 	__ip_mc_inc_group(in_dev, htonl(INADDR_ALLSNOOPERS_GROUP), GFP_ATOMIC); | 
 | 	in_dev_put(in_dev); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_join_snoopers(struct net_bridge *br) | 
 | { | 
 | 	struct in6_addr addr; | 
 |  | 
 | 	ipv6_addr_set(&addr, htonl(0xff020000), 0, 0, htonl(0x6a)); | 
 | 	ipv6_dev_mc_inc(br->dev, &addr); | 
 | } | 
 | #else | 
 | static inline void br_ip6_multicast_join_snoopers(struct net_bridge *br) | 
 | { | 
 | } | 
 | #endif | 
 |  | 
 | void br_multicast_join_snoopers(struct net_bridge *br) | 
 | { | 
 | 	br_ip4_multicast_join_snoopers(br); | 
 | 	br_ip6_multicast_join_snoopers(br); | 
 | } | 
 |  | 
 | static void br_ip4_multicast_leave_snoopers(struct net_bridge *br) | 
 | { | 
 | 	struct in_device *in_dev = in_dev_get(br->dev); | 
 |  | 
 | 	if (WARN_ON(!in_dev)) | 
 | 		return; | 
 |  | 
 | 	__ip_mc_dec_group(in_dev, htonl(INADDR_ALLSNOOPERS_GROUP), GFP_ATOMIC); | 
 | 	in_dev_put(in_dev); | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | static void br_ip6_multicast_leave_snoopers(struct net_bridge *br) | 
 | { | 
 | 	struct in6_addr addr; | 
 |  | 
 | 	ipv6_addr_set(&addr, htonl(0xff020000), 0, 0, htonl(0x6a)); | 
 | 	ipv6_dev_mc_dec(br->dev, &addr); | 
 | } | 
 | #else | 
 | static inline void br_ip6_multicast_leave_snoopers(struct net_bridge *br) | 
 | { | 
 | } | 
 | #endif | 
 |  | 
 | void br_multicast_leave_snoopers(struct net_bridge *br) | 
 | { | 
 | 	br_ip4_multicast_leave_snoopers(br); | 
 | 	br_ip6_multicast_leave_snoopers(br); | 
 | } | 
 |  | 
 | static void __br_multicast_open_query(struct net_bridge *br, | 
 | 				      struct bridge_mcast_own_query *query) | 
 | { | 
 | 	query->startup_sent = 0; | 
 |  | 
 | 	if (!br_opt_get(br, BROPT_MULTICAST_ENABLED)) | 
 | 		return; | 
 |  | 
 | 	mod_timer(&query->timer, jiffies); | 
 | } | 
 |  | 
 | static void __br_multicast_open(struct net_bridge_mcast *brmctx) | 
 | { | 
 | 	__br_multicast_open_query(brmctx->br, &brmctx->ip4_own_query); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	__br_multicast_open_query(brmctx->br, &brmctx->ip6_own_query); | 
 | #endif | 
 | } | 
 |  | 
 | void br_multicast_open(struct net_bridge *br) | 
 | { | 
 | 	ASSERT_RTNL(); | 
 |  | 
 | 	if (br_opt_get(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) { | 
 | 		struct net_bridge_vlan_group *vg; | 
 | 		struct net_bridge_vlan *vlan; | 
 |  | 
 | 		vg = br_vlan_group(br); | 
 | 		if (vg) { | 
 | 			list_for_each_entry(vlan, &vg->vlan_list, vlist) { | 
 | 				struct net_bridge_mcast *brmctx; | 
 |  | 
 | 				brmctx = &vlan->br_mcast_ctx; | 
 | 				if (br_vlan_is_brentry(vlan) && | 
 | 				    !br_multicast_ctx_vlan_disabled(brmctx)) | 
 | 					__br_multicast_open(&vlan->br_mcast_ctx); | 
 | 			} | 
 | 		} | 
 | 	} else { | 
 | 		__br_multicast_open(&br->multicast_ctx); | 
 | 	} | 
 | } | 
 |  | 
 | static void __br_multicast_stop(struct net_bridge_mcast *brmctx) | 
 | { | 
 | 	timer_delete_sync(&brmctx->ip4_mc_router_timer); | 
 | 	timer_delete_sync(&brmctx->ip4_other_query.timer); | 
 | 	timer_delete_sync(&brmctx->ip4_other_query.delay_timer); | 
 | 	timer_delete_sync(&brmctx->ip4_own_query.timer); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	timer_delete_sync(&brmctx->ip6_mc_router_timer); | 
 | 	timer_delete_sync(&brmctx->ip6_other_query.timer); | 
 | 	timer_delete_sync(&brmctx->ip6_other_query.delay_timer); | 
 | 	timer_delete_sync(&brmctx->ip6_own_query.timer); | 
 | #endif | 
 | } | 
 |  | 
 | void br_multicast_update_vlan_mcast_ctx(struct net_bridge_vlan *v, u8 state) | 
 | { | 
 | #if IS_ENABLED(CONFIG_BRIDGE_VLAN_FILTERING) | 
 | 	struct net_bridge *br; | 
 |  | 
 | 	if (!br_vlan_should_use(v)) | 
 | 		return; | 
 |  | 
 | 	if (br_vlan_is_master(v)) | 
 | 		return; | 
 |  | 
 | 	br = v->port->br; | 
 |  | 
 | 	if (!br_opt_get(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) | 
 | 		return; | 
 |  | 
 | 	if (br_vlan_state_allowed(state, true)) | 
 | 		br_multicast_enable_port_ctx(&v->port_mcast_ctx); | 
 |  | 
 | 	/* Multicast is not disabled for the vlan when it goes in | 
 | 	 * blocking state because the timers will expire and stop by | 
 | 	 * themselves without sending more queries. | 
 | 	 */ | 
 | #endif | 
 | } | 
 |  | 
 | void br_multicast_toggle_one_vlan(struct net_bridge_vlan *vlan, bool on) | 
 | { | 
 | 	struct net_bridge *br; | 
 |  | 
 | 	/* it's okay to check for the flag without the multicast lock because it | 
 | 	 * can only change under RTNL -> multicast_lock, we need the latter to | 
 | 	 * sync with timers and packets | 
 | 	 */ | 
 | 	if (on == !!(vlan->priv_flags & BR_VLFLAG_MCAST_ENABLED)) | 
 | 		return; | 
 |  | 
 | 	if (br_vlan_is_master(vlan)) { | 
 | 		br = vlan->br; | 
 |  | 
 | 		if (!br_vlan_is_brentry(vlan) || | 
 | 		    (on && | 
 | 		     br_multicast_ctx_vlan_global_disabled(&vlan->br_mcast_ctx))) | 
 | 			return; | 
 |  | 
 | 		spin_lock_bh(&br->multicast_lock); | 
 | 		vlan->priv_flags ^= BR_VLFLAG_MCAST_ENABLED; | 
 | 		spin_unlock_bh(&br->multicast_lock); | 
 |  | 
 | 		if (on) | 
 | 			__br_multicast_open(&vlan->br_mcast_ctx); | 
 | 		else | 
 | 			__br_multicast_stop(&vlan->br_mcast_ctx); | 
 | 	} else { | 
 | 		struct net_bridge_mcast *brmctx; | 
 |  | 
 | 		brmctx = br_multicast_port_ctx_get_global(&vlan->port_mcast_ctx); | 
 | 		if (on && br_multicast_ctx_vlan_global_disabled(brmctx)) | 
 | 			return; | 
 |  | 
 | 		br = vlan->port->br; | 
 | 		spin_lock_bh(&br->multicast_lock); | 
 | 		vlan->priv_flags ^= BR_VLFLAG_MCAST_ENABLED; | 
 | 		if (on) | 
 | 			__br_multicast_enable_port_ctx(&vlan->port_mcast_ctx); | 
 | 		else | 
 | 			__br_multicast_disable_port_ctx(&vlan->port_mcast_ctx); | 
 | 		spin_unlock_bh(&br->multicast_lock); | 
 | 	} | 
 | } | 
 |  | 
 | static void br_multicast_toggle_vlan(struct net_bridge_vlan *vlan, bool on) | 
 | { | 
 | 	struct net_bridge_port *p; | 
 |  | 
 | 	if (WARN_ON_ONCE(!br_vlan_is_master(vlan))) | 
 | 		return; | 
 |  | 
 | 	list_for_each_entry(p, &vlan->br->port_list, list) { | 
 | 		struct net_bridge_vlan *vport; | 
 |  | 
 | 		vport = br_vlan_find(nbp_vlan_group(p), vlan->vid); | 
 | 		if (!vport) | 
 | 			continue; | 
 | 		br_multicast_toggle_one_vlan(vport, on); | 
 | 	} | 
 |  | 
 | 	if (br_vlan_is_brentry(vlan)) | 
 | 		br_multicast_toggle_one_vlan(vlan, on); | 
 | } | 
 |  | 
 | int br_multicast_toggle_vlan_snooping(struct net_bridge *br, bool on, | 
 | 				      struct netlink_ext_ack *extack) | 
 | { | 
 | 	struct net_bridge_vlan_group *vg; | 
 | 	struct net_bridge_vlan *vlan; | 
 | 	struct net_bridge_port *p; | 
 |  | 
 | 	if (br_opt_get(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED) == on) | 
 | 		return 0; | 
 |  | 
 | 	if (on && !br_opt_get(br, BROPT_VLAN_ENABLED)) { | 
 | 		NL_SET_ERR_MSG_MOD(extack, "Cannot enable multicast vlan snooping with vlan filtering disabled"); | 
 | 		return -EINVAL; | 
 | 	} | 
 |  | 
 | 	vg = br_vlan_group(br); | 
 | 	if (!vg) | 
 | 		return 0; | 
 |  | 
 | 	br_opt_toggle(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED, on); | 
 |  | 
 | 	/* disable/enable non-vlan mcast contexts based on vlan snooping */ | 
 | 	if (on) | 
 | 		__br_multicast_stop(&br->multicast_ctx); | 
 | 	else | 
 | 		__br_multicast_open(&br->multicast_ctx); | 
 | 	list_for_each_entry(p, &br->port_list, list) { | 
 | 		if (on) | 
 | 			br_multicast_disable_port_ctx(&p->multicast_ctx); | 
 | 		else | 
 | 			br_multicast_enable_port_ctx(&p->multicast_ctx); | 
 | 	} | 
 |  | 
 | 	list_for_each_entry(vlan, &vg->vlan_list, vlist) | 
 | 		br_multicast_toggle_vlan(vlan, on); | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | bool br_multicast_toggle_global_vlan(struct net_bridge_vlan *vlan, bool on) | 
 | { | 
 | 	ASSERT_RTNL(); | 
 |  | 
 | 	/* BR_VLFLAG_GLOBAL_MCAST_ENABLED relies on eventual consistency and | 
 | 	 * requires only RTNL to change | 
 | 	 */ | 
 | 	if (on == !!(vlan->priv_flags & BR_VLFLAG_GLOBAL_MCAST_ENABLED)) | 
 | 		return false; | 
 |  | 
 | 	vlan->priv_flags ^= BR_VLFLAG_GLOBAL_MCAST_ENABLED; | 
 | 	br_multicast_toggle_vlan(vlan, on); | 
 |  | 
 | 	return true; | 
 | } | 
 |  | 
 | void br_multicast_stop(struct net_bridge *br) | 
 | { | 
 | 	ASSERT_RTNL(); | 
 |  | 
 | 	if (br_opt_get(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) { | 
 | 		struct net_bridge_vlan_group *vg; | 
 | 		struct net_bridge_vlan *vlan; | 
 |  | 
 | 		vg = br_vlan_group(br); | 
 | 		if (vg) { | 
 | 			list_for_each_entry(vlan, &vg->vlan_list, vlist) { | 
 | 				struct net_bridge_mcast *brmctx; | 
 |  | 
 | 				brmctx = &vlan->br_mcast_ctx; | 
 | 				if (br_vlan_is_brentry(vlan) && | 
 | 				    !br_multicast_ctx_vlan_disabled(brmctx)) | 
 | 					__br_multicast_stop(&vlan->br_mcast_ctx); | 
 | 			} | 
 | 		} | 
 | 	} else { | 
 | 		__br_multicast_stop(&br->multicast_ctx); | 
 | 	} | 
 | } | 
 |  | 
 | void br_multicast_dev_del(struct net_bridge *br) | 
 | { | 
 | 	struct net_bridge_mdb_entry *mp; | 
 | 	HLIST_HEAD(deleted_head); | 
 | 	struct hlist_node *tmp; | 
 |  | 
 | 	spin_lock_bh(&br->multicast_lock); | 
 | 	hlist_for_each_entry_safe(mp, tmp, &br->mdb_list, mdb_node) | 
 | 		br_multicast_del_mdb_entry(mp); | 
 | 	hlist_move_list(&br->mcast_gc_list, &deleted_head); | 
 | 	spin_unlock_bh(&br->multicast_lock); | 
 |  | 
 | 	br_multicast_ctx_deinit(&br->multicast_ctx); | 
 | 	br_multicast_gc(&deleted_head); | 
 | 	cancel_work_sync(&br->mcast_gc_work); | 
 |  | 
 | 	rcu_barrier(); | 
 | } | 
 |  | 
 | int br_multicast_set_router(struct net_bridge_mcast *brmctx, unsigned long val) | 
 | { | 
 | 	int err = -EINVAL; | 
 |  | 
 | 	spin_lock_bh(&brmctx->br->multicast_lock); | 
 |  | 
 | 	switch (val) { | 
 | 	case MDB_RTR_TYPE_DISABLED: | 
 | 	case MDB_RTR_TYPE_PERM: | 
 | 		br_mc_router_state_change(brmctx->br, val == MDB_RTR_TYPE_PERM); | 
 | 		timer_delete(&brmctx->ip4_mc_router_timer); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 		timer_delete(&brmctx->ip6_mc_router_timer); | 
 | #endif | 
 | 		brmctx->multicast_router = val; | 
 | 		err = 0; | 
 | 		break; | 
 | 	case MDB_RTR_TYPE_TEMP_QUERY: | 
 | 		if (brmctx->multicast_router != MDB_RTR_TYPE_TEMP_QUERY) | 
 | 			br_mc_router_state_change(brmctx->br, false); | 
 | 		brmctx->multicast_router = val; | 
 | 		err = 0; | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	spin_unlock_bh(&brmctx->br->multicast_lock); | 
 |  | 
 | 	return err; | 
 | } | 
 |  | 
 | static void | 
 | br_multicast_rport_del_notify(struct net_bridge_mcast_port *pmctx, bool deleted) | 
 | { | 
 | 	if (!deleted) | 
 | 		return; | 
 |  | 
 | 	/* For backwards compatibility for now, only notify if there is | 
 | 	 * no multicast router anymore for both IPv4 and IPv6. | 
 | 	 */ | 
 | 	if (!hlist_unhashed(&pmctx->ip4_rlist)) | 
 | 		return; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	if (!hlist_unhashed(&pmctx->ip6_rlist)) | 
 | 		return; | 
 | #endif | 
 |  | 
 | 	br_rtr_notify(pmctx->port->br->dev, pmctx, RTM_DELMDB); | 
 | 	br_port_mc_router_state_change(pmctx->port, false); | 
 |  | 
 | 	/* don't allow timer refresh */ | 
 | 	if (pmctx->multicast_router == MDB_RTR_TYPE_TEMP) | 
 | 		pmctx->multicast_router = MDB_RTR_TYPE_TEMP_QUERY; | 
 | } | 
 |  | 
 | int br_multicast_set_port_router(struct net_bridge_mcast_port *pmctx, | 
 | 				 unsigned long val) | 
 | { | 
 | 	struct net_bridge_mcast *brmctx; | 
 | 	unsigned long now = jiffies; | 
 | 	int err = -EINVAL; | 
 | 	bool del = false; | 
 |  | 
 | 	brmctx = br_multicast_port_ctx_get_global(pmctx); | 
 | 	spin_lock_bh(&brmctx->br->multicast_lock); | 
 | 	if (pmctx->multicast_router == val) { | 
 | 		/* Refresh the temp router port timer */ | 
 | 		if (pmctx->multicast_router == MDB_RTR_TYPE_TEMP) { | 
 | 			mod_timer(&pmctx->ip4_mc_router_timer, | 
 | 				  now + brmctx->multicast_querier_interval); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 			mod_timer(&pmctx->ip6_mc_router_timer, | 
 | 				  now + brmctx->multicast_querier_interval); | 
 | #endif | 
 | 		} | 
 | 		err = 0; | 
 | 		goto unlock; | 
 | 	} | 
 | 	switch (val) { | 
 | 	case MDB_RTR_TYPE_DISABLED: | 
 | 		pmctx->multicast_router = MDB_RTR_TYPE_DISABLED; | 
 | 		del |= br_ip4_multicast_rport_del(pmctx); | 
 | 		timer_delete(&pmctx->ip4_mc_router_timer); | 
 | 		del |= br_ip6_multicast_rport_del(pmctx); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 		timer_delete(&pmctx->ip6_mc_router_timer); | 
 | #endif | 
 | 		br_multicast_rport_del_notify(pmctx, del); | 
 | 		break; | 
 | 	case MDB_RTR_TYPE_TEMP_QUERY: | 
 | 		pmctx->multicast_router = MDB_RTR_TYPE_TEMP_QUERY; | 
 | 		del |= br_ip4_multicast_rport_del(pmctx); | 
 | 		del |= br_ip6_multicast_rport_del(pmctx); | 
 | 		br_multicast_rport_del_notify(pmctx, del); | 
 | 		break; | 
 | 	case MDB_RTR_TYPE_PERM: | 
 | 		pmctx->multicast_router = MDB_RTR_TYPE_PERM; | 
 | 		timer_delete(&pmctx->ip4_mc_router_timer); | 
 | 		br_ip4_multicast_add_router(brmctx, pmctx); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 		timer_delete(&pmctx->ip6_mc_router_timer); | 
 | #endif | 
 | 		br_ip6_multicast_add_router(brmctx, pmctx); | 
 | 		break; | 
 | 	case MDB_RTR_TYPE_TEMP: | 
 | 		pmctx->multicast_router = MDB_RTR_TYPE_TEMP; | 
 | 		br_ip4_multicast_mark_router(brmctx, pmctx); | 
 | 		br_ip6_multicast_mark_router(brmctx, pmctx); | 
 | 		break; | 
 | 	default: | 
 | 		goto unlock; | 
 | 	} | 
 | 	err = 0; | 
 | unlock: | 
 | 	spin_unlock_bh(&brmctx->br->multicast_lock); | 
 |  | 
 | 	return err; | 
 | } | 
 |  | 
 | int br_multicast_set_vlan_router(struct net_bridge_vlan *v, u8 mcast_router) | 
 | { | 
 | 	int err; | 
 |  | 
 | 	if (br_vlan_is_master(v)) | 
 | 		err = br_multicast_set_router(&v->br_mcast_ctx, mcast_router); | 
 | 	else | 
 | 		err = br_multicast_set_port_router(&v->port_mcast_ctx, | 
 | 						   mcast_router); | 
 |  | 
 | 	return err; | 
 | } | 
 |  | 
 | static void br_multicast_start_querier(struct net_bridge_mcast *brmctx, | 
 | 				       struct bridge_mcast_own_query *query) | 
 | { | 
 | 	struct net_bridge_port *port; | 
 |  | 
 | 	if (!br_multicast_ctx_matches_vlan_snooping(brmctx)) | 
 | 		return; | 
 |  | 
 | 	__br_multicast_open_query(brmctx->br, query); | 
 |  | 
 | 	rcu_read_lock(); | 
 | 	list_for_each_entry_rcu(port, &brmctx->br->port_list, list) { | 
 | 		struct bridge_mcast_own_query *ip4_own_query; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 		struct bridge_mcast_own_query *ip6_own_query; | 
 | #endif | 
 |  | 
 | 		if (br_multicast_port_ctx_state_stopped(&port->multicast_ctx)) | 
 | 			continue; | 
 |  | 
 | 		if (br_multicast_ctx_is_vlan(brmctx)) { | 
 | 			struct net_bridge_vlan *vlan; | 
 |  | 
 | 			vlan = br_vlan_find(nbp_vlan_group_rcu(port), | 
 | 					    brmctx->vlan->vid); | 
 | 			if (!vlan || | 
 | 			    br_multicast_port_ctx_state_stopped(&vlan->port_mcast_ctx)) | 
 | 				continue; | 
 |  | 
 | 			ip4_own_query = &vlan->port_mcast_ctx.ip4_own_query; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 			ip6_own_query = &vlan->port_mcast_ctx.ip6_own_query; | 
 | #endif | 
 | 		} else { | 
 | 			ip4_own_query = &port->multicast_ctx.ip4_own_query; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 			ip6_own_query = &port->multicast_ctx.ip6_own_query; | 
 | #endif | 
 | 		} | 
 |  | 
 | 		if (query == &brmctx->ip4_own_query) | 
 | 			br_multicast_enable(ip4_own_query); | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 		else | 
 | 			br_multicast_enable(ip6_own_query); | 
 | #endif | 
 | 	} | 
 | 	rcu_read_unlock(); | 
 | } | 
 |  | 
 | int br_multicast_toggle(struct net_bridge *br, unsigned long val, | 
 | 			struct netlink_ext_ack *extack) | 
 | { | 
 | 	struct net_bridge_port *port; | 
 | 	bool change_snoopers = false; | 
 | 	int err = 0; | 
 |  | 
 | 	spin_lock_bh(&br->multicast_lock); | 
 | 	if (!!br_opt_get(br, BROPT_MULTICAST_ENABLED) == !!val) | 
 | 		goto unlock; | 
 |  | 
 | 	err = br_mc_disabled_update(br->dev, val, extack); | 
 | 	if (err == -EOPNOTSUPP) | 
 | 		err = 0; | 
 | 	if (err) | 
 | 		goto unlock; | 
 |  | 
 | 	br_opt_toggle(br, BROPT_MULTICAST_ENABLED, !!val); | 
 | 	if (!br_opt_get(br, BROPT_MULTICAST_ENABLED)) { | 
 | 		change_snoopers = true; | 
 | 		goto unlock; | 
 | 	} | 
 |  | 
 | 	if (!netif_running(br->dev)) | 
 | 		goto unlock; | 
 |  | 
 | 	br_multicast_open(br); | 
 | 	list_for_each_entry(port, &br->port_list, list) | 
 | 		__br_multicast_enable_port_ctx(&port->multicast_ctx); | 
 |  | 
 | 	change_snoopers = true; | 
 |  | 
 | unlock: | 
 | 	spin_unlock_bh(&br->multicast_lock); | 
 |  | 
 | 	/* br_multicast_join_snoopers has the potential to cause | 
 | 	 * an MLD Report/Leave to be delivered to br_multicast_rcv, | 
 | 	 * which would in turn call br_multicast_add_group, which would | 
 | 	 * attempt to acquire multicast_lock. This function should be | 
 | 	 * called after the lock has been released to avoid deadlocks on | 
 | 	 * multicast_lock. | 
 | 	 * | 
 | 	 * br_multicast_leave_snoopers does not have the problem since | 
 | 	 * br_multicast_rcv first checks BROPT_MULTICAST_ENABLED, and | 
 | 	 * returns without calling br_multicast_ipv4/6_rcv if it's not | 
 | 	 * enabled. Moved both functions out just for symmetry. | 
 | 	 */ | 
 | 	if (change_snoopers) { | 
 | 		if (br_opt_get(br, BROPT_MULTICAST_ENABLED)) | 
 | 			br_multicast_join_snoopers(br); | 
 | 		else | 
 | 			br_multicast_leave_snoopers(br); | 
 | 	} | 
 |  | 
 | 	return err; | 
 | } | 
 |  | 
 | bool br_multicast_enabled(const struct net_device *dev) | 
 | { | 
 | 	struct net_bridge *br = netdev_priv(dev); | 
 |  | 
 | 	return !!br_opt_get(br, BROPT_MULTICAST_ENABLED); | 
 | } | 
 | EXPORT_SYMBOL_GPL(br_multicast_enabled); | 
 |  | 
 | bool br_multicast_router(const struct net_device *dev) | 
 | { | 
 | 	struct net_bridge *br = netdev_priv(dev); | 
 | 	bool is_router; | 
 |  | 
 | 	spin_lock_bh(&br->multicast_lock); | 
 | 	is_router = br_multicast_is_router(&br->multicast_ctx, NULL); | 
 | 	spin_unlock_bh(&br->multicast_lock); | 
 | 	return is_router; | 
 | } | 
 | EXPORT_SYMBOL_GPL(br_multicast_router); | 
 |  | 
 | int br_multicast_set_querier(struct net_bridge_mcast *brmctx, unsigned long val) | 
 | { | 
 | 	unsigned long max_delay; | 
 |  | 
 | 	val = !!val; | 
 |  | 
 | 	spin_lock_bh(&brmctx->br->multicast_lock); | 
 | 	if (brmctx->multicast_querier == val) | 
 | 		goto unlock; | 
 |  | 
 | 	WRITE_ONCE(brmctx->multicast_querier, val); | 
 | 	if (!val) | 
 | 		goto unlock; | 
 |  | 
 | 	max_delay = brmctx->multicast_query_response_interval; | 
 |  | 
 | 	if (!timer_pending(&brmctx->ip4_other_query.timer)) | 
 | 		mod_timer(&brmctx->ip4_other_query.delay_timer, | 
 | 			  jiffies + max_delay); | 
 |  | 
 | 	br_multicast_start_querier(brmctx, &brmctx->ip4_own_query); | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	if (!timer_pending(&brmctx->ip6_other_query.timer)) | 
 | 		mod_timer(&brmctx->ip6_other_query.delay_timer, | 
 | 			  jiffies + max_delay); | 
 |  | 
 | 	br_multicast_start_querier(brmctx, &brmctx->ip6_own_query); | 
 | #endif | 
 |  | 
 | unlock: | 
 | 	spin_unlock_bh(&brmctx->br->multicast_lock); | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | int br_multicast_set_igmp_version(struct net_bridge_mcast *brmctx, | 
 | 				  unsigned long val) | 
 | { | 
 | 	/* Currently we support only version 2 and 3 */ | 
 | 	switch (val) { | 
 | 	case 2: | 
 | 	case 3: | 
 | 		break; | 
 | 	default: | 
 | 		return -EINVAL; | 
 | 	} | 
 |  | 
 | 	spin_lock_bh(&brmctx->br->multicast_lock); | 
 | 	brmctx->multicast_igmp_version = val; | 
 | 	spin_unlock_bh(&brmctx->br->multicast_lock); | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | int br_multicast_set_mld_version(struct net_bridge_mcast *brmctx, | 
 | 				 unsigned long val) | 
 | { | 
 | 	/* Currently we support version 1 and 2 */ | 
 | 	switch (val) { | 
 | 	case 1: | 
 | 	case 2: | 
 | 		break; | 
 | 	default: | 
 | 		return -EINVAL; | 
 | 	} | 
 |  | 
 | 	spin_lock_bh(&brmctx->br->multicast_lock); | 
 | 	brmctx->multicast_mld_version = val; | 
 | 	spin_unlock_bh(&brmctx->br->multicast_lock); | 
 |  | 
 | 	return 0; | 
 | } | 
 | #endif | 
 |  | 
 | void br_multicast_set_query_intvl(struct net_bridge_mcast *brmctx, | 
 | 				  unsigned long val) | 
 | { | 
 | 	unsigned long intvl_jiffies = clock_t_to_jiffies(val); | 
 |  | 
 | 	if (intvl_jiffies < BR_MULTICAST_QUERY_INTVL_MIN) { | 
 | 		br_info(brmctx->br, | 
 | 			"trying to set multicast query interval below minimum, setting to %lu (%ums)\n", | 
 | 			jiffies_to_clock_t(BR_MULTICAST_QUERY_INTVL_MIN), | 
 | 			jiffies_to_msecs(BR_MULTICAST_QUERY_INTVL_MIN)); | 
 | 		intvl_jiffies = BR_MULTICAST_QUERY_INTVL_MIN; | 
 | 	} | 
 |  | 
 | 	brmctx->multicast_query_interval = intvl_jiffies; | 
 | } | 
 |  | 
 | void br_multicast_set_startup_query_intvl(struct net_bridge_mcast *brmctx, | 
 | 					  unsigned long val) | 
 | { | 
 | 	unsigned long intvl_jiffies = clock_t_to_jiffies(val); | 
 |  | 
 | 	if (intvl_jiffies < BR_MULTICAST_STARTUP_QUERY_INTVL_MIN) { | 
 | 		br_info(brmctx->br, | 
 | 			"trying to set multicast startup query interval below minimum, setting to %lu (%ums)\n", | 
 | 			jiffies_to_clock_t(BR_MULTICAST_STARTUP_QUERY_INTVL_MIN), | 
 | 			jiffies_to_msecs(BR_MULTICAST_STARTUP_QUERY_INTVL_MIN)); | 
 | 		intvl_jiffies = BR_MULTICAST_STARTUP_QUERY_INTVL_MIN; | 
 | 	} | 
 |  | 
 | 	brmctx->multicast_startup_query_interval = intvl_jiffies; | 
 | } | 
 |  | 
 | /** | 
 |  * br_multicast_list_adjacent - Returns snooped multicast addresses | 
 |  * @dev:	The bridge port adjacent to which to retrieve addresses | 
 |  * @br_ip_list:	The list to store found, snooped multicast IP addresses in | 
 |  * | 
 |  * Creates a list of IP addresses (struct br_ip_list) sensed by the multicast | 
 |  * snooping feature on all bridge ports of dev's bridge device, excluding | 
 |  * the addresses from dev itself. | 
 |  * | 
 |  * Returns the number of items added to br_ip_list. | 
 |  * | 
 |  * Notes: | 
 |  * - br_ip_list needs to be initialized by caller | 
 |  * - br_ip_list might contain duplicates in the end | 
 |  *   (needs to be taken care of by caller) | 
 |  * - br_ip_list needs to be freed by caller | 
 |  */ | 
 | int br_multicast_list_adjacent(struct net_device *dev, | 
 | 			       struct list_head *br_ip_list) | 
 | { | 
 | 	struct net_bridge *br; | 
 | 	struct net_bridge_port *port; | 
 | 	struct net_bridge_port_group *group; | 
 | 	struct br_ip_list *entry; | 
 | 	int count = 0; | 
 |  | 
 | 	rcu_read_lock(); | 
 | 	if (!br_ip_list || !netif_is_bridge_port(dev)) | 
 | 		goto unlock; | 
 |  | 
 | 	port = br_port_get_rcu(dev); | 
 | 	if (!port || !port->br) | 
 | 		goto unlock; | 
 |  | 
 | 	br = port->br; | 
 |  | 
 | 	list_for_each_entry_rcu(port, &br->port_list, list) { | 
 | 		if (!port->dev || port->dev == dev) | 
 | 			continue; | 
 |  | 
 | 		hlist_for_each_entry_rcu(group, &port->mglist, mglist) { | 
 | 			entry = kmalloc(sizeof(*entry), GFP_ATOMIC); | 
 | 			if (!entry) | 
 | 				goto unlock; | 
 |  | 
 | 			entry->addr = group->key.addr; | 
 | 			list_add(&entry->list, br_ip_list); | 
 | 			count++; | 
 | 		} | 
 | 	} | 
 |  | 
 | unlock: | 
 | 	rcu_read_unlock(); | 
 | 	return count; | 
 | } | 
 | EXPORT_SYMBOL_GPL(br_multicast_list_adjacent); | 
 |  | 
 | /** | 
 |  * br_multicast_has_querier_anywhere - Checks for a querier on a bridge | 
 |  * @dev: The bridge port providing the bridge on which to check for a querier | 
 |  * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6 | 
 |  * | 
 |  * Checks whether the given interface has a bridge on top and if so returns | 
 |  * true if a valid querier exists anywhere on the bridged link layer. | 
 |  * Otherwise returns false. | 
 |  */ | 
 | bool br_multicast_has_querier_anywhere(struct net_device *dev, int proto) | 
 | { | 
 | 	struct net_bridge *br; | 
 | 	struct net_bridge_port *port; | 
 | 	struct ethhdr eth; | 
 | 	bool ret = false; | 
 |  | 
 | 	rcu_read_lock(); | 
 | 	if (!netif_is_bridge_port(dev)) | 
 | 		goto unlock; | 
 |  | 
 | 	port = br_port_get_rcu(dev); | 
 | 	if (!port || !port->br) | 
 | 		goto unlock; | 
 |  | 
 | 	br = port->br; | 
 |  | 
 | 	memset(ð, 0, sizeof(eth)); | 
 | 	eth.h_proto = htons(proto); | 
 |  | 
 | 	ret = br_multicast_querier_exists(&br->multicast_ctx, ð, NULL); | 
 |  | 
 | unlock: | 
 | 	rcu_read_unlock(); | 
 | 	return ret; | 
 | } | 
 | EXPORT_SYMBOL_GPL(br_multicast_has_querier_anywhere); | 
 |  | 
 | /** | 
 |  * br_multicast_has_querier_adjacent - Checks for a querier behind a bridge port | 
 |  * @dev: The bridge port adjacent to which to check for a querier | 
 |  * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6 | 
 |  * | 
 |  * Checks whether the given interface has a bridge on top and if so returns | 
 |  * true if a selected querier is behind one of the other ports of this | 
 |  * bridge. Otherwise returns false. | 
 |  */ | 
 | bool br_multicast_has_querier_adjacent(struct net_device *dev, int proto) | 
 | { | 
 | 	struct net_bridge_mcast *brmctx; | 
 | 	struct net_bridge *br; | 
 | 	struct net_bridge_port *port; | 
 | 	bool ret = false; | 
 | 	int port_ifidx; | 
 |  | 
 | 	rcu_read_lock(); | 
 | 	if (!netif_is_bridge_port(dev)) | 
 | 		goto unlock; | 
 |  | 
 | 	port = br_port_get_rcu(dev); | 
 | 	if (!port || !port->br) | 
 | 		goto unlock; | 
 |  | 
 | 	br = port->br; | 
 | 	brmctx = &br->multicast_ctx; | 
 |  | 
 | 	switch (proto) { | 
 | 	case ETH_P_IP: | 
 | 		port_ifidx = brmctx->ip4_querier.port_ifidx; | 
 | 		if (!timer_pending(&brmctx->ip4_other_query.timer) || | 
 | 		    port_ifidx == port->dev->ifindex) | 
 | 			goto unlock; | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case ETH_P_IPV6: | 
 | 		port_ifidx = brmctx->ip6_querier.port_ifidx; | 
 | 		if (!timer_pending(&brmctx->ip6_other_query.timer) || | 
 | 		    port_ifidx == port->dev->ifindex) | 
 | 			goto unlock; | 
 | 		break; | 
 | #endif | 
 | 	default: | 
 | 		goto unlock; | 
 | 	} | 
 |  | 
 | 	ret = true; | 
 | unlock: | 
 | 	rcu_read_unlock(); | 
 | 	return ret; | 
 | } | 
 | EXPORT_SYMBOL_GPL(br_multicast_has_querier_adjacent); | 
 |  | 
 | /** | 
 |  * br_multicast_has_router_adjacent - Checks for a router behind a bridge port | 
 |  * @dev: The bridge port adjacent to which to check for a multicast router | 
 |  * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6 | 
 |  * | 
 |  * Checks whether the given interface has a bridge on top and if so returns | 
 |  * true if a multicast router is behind one of the other ports of this | 
 |  * bridge. Otherwise returns false. | 
 |  */ | 
 | bool br_multicast_has_router_adjacent(struct net_device *dev, int proto) | 
 | { | 
 | 	struct net_bridge_mcast_port *pmctx; | 
 | 	struct net_bridge_mcast *brmctx; | 
 | 	struct net_bridge_port *port; | 
 | 	bool ret = false; | 
 |  | 
 | 	rcu_read_lock(); | 
 | 	port = br_port_get_check_rcu(dev); | 
 | 	if (!port) | 
 | 		goto unlock; | 
 |  | 
 | 	brmctx = &port->br->multicast_ctx; | 
 | 	switch (proto) { | 
 | 	case ETH_P_IP: | 
 | 		hlist_for_each_entry_rcu(pmctx, &brmctx->ip4_mc_router_list, | 
 | 					 ip4_rlist) { | 
 | 			if (pmctx->port == port) | 
 | 				continue; | 
 |  | 
 | 			ret = true; | 
 | 			goto unlock; | 
 | 		} | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case ETH_P_IPV6: | 
 | 		hlist_for_each_entry_rcu(pmctx, &brmctx->ip6_mc_router_list, | 
 | 					 ip6_rlist) { | 
 | 			if (pmctx->port == port) | 
 | 				continue; | 
 |  | 
 | 			ret = true; | 
 | 			goto unlock; | 
 | 		} | 
 | 		break; | 
 | #endif | 
 | 	default: | 
 | 		/* when compiled without IPv6 support, be conservative and | 
 | 		 * always assume presence of an IPv6 multicast router | 
 | 		 */ | 
 | 		ret = true; | 
 | 	} | 
 |  | 
 | unlock: | 
 | 	rcu_read_unlock(); | 
 | 	return ret; | 
 | } | 
 | EXPORT_SYMBOL_GPL(br_multicast_has_router_adjacent); | 
 |  | 
 | static void br_mcast_stats_add(struct bridge_mcast_stats __percpu *stats, | 
 | 			       const struct sk_buff *skb, u8 type, u8 dir) | 
 | { | 
 | 	struct bridge_mcast_stats *pstats = this_cpu_ptr(stats); | 
 | 	__be16 proto = skb->protocol; | 
 | 	unsigned int t_len; | 
 |  | 
 | 	u64_stats_update_begin(&pstats->syncp); | 
 | 	switch (proto) { | 
 | 	case htons(ETH_P_IP): | 
 | 		t_len = ntohs(ip_hdr(skb)->tot_len) - ip_hdrlen(skb); | 
 | 		switch (type) { | 
 | 		case IGMP_HOST_MEMBERSHIP_REPORT: | 
 | 			pstats->mstats.igmp_v1reports[dir]++; | 
 | 			break; | 
 | 		case IGMPV2_HOST_MEMBERSHIP_REPORT: | 
 | 			pstats->mstats.igmp_v2reports[dir]++; | 
 | 			break; | 
 | 		case IGMPV3_HOST_MEMBERSHIP_REPORT: | 
 | 			pstats->mstats.igmp_v3reports[dir]++; | 
 | 			break; | 
 | 		case IGMP_HOST_MEMBERSHIP_QUERY: | 
 | 			if (t_len != sizeof(struct igmphdr)) { | 
 | 				pstats->mstats.igmp_v3queries[dir]++; | 
 | 			} else { | 
 | 				unsigned int offset = skb_transport_offset(skb); | 
 | 				struct igmphdr *ih, _ihdr; | 
 |  | 
 | 				ih = skb_header_pointer(skb, offset, | 
 | 							sizeof(_ihdr), &_ihdr); | 
 | 				if (!ih) | 
 | 					break; | 
 | 				if (!ih->code) | 
 | 					pstats->mstats.igmp_v1queries[dir]++; | 
 | 				else | 
 | 					pstats->mstats.igmp_v2queries[dir]++; | 
 | 			} | 
 | 			break; | 
 | 		case IGMP_HOST_LEAVE_MESSAGE: | 
 | 			pstats->mstats.igmp_leaves[dir]++; | 
 | 			break; | 
 | 		} | 
 | 		break; | 
 | #if IS_ENABLED(CONFIG_IPV6) | 
 | 	case htons(ETH_P_IPV6): | 
 | 		t_len = ntohs(ipv6_hdr(skb)->payload_len) + | 
 | 			sizeof(struct ipv6hdr); | 
 | 		t_len -= skb_network_header_len(skb); | 
 | 		switch (type) { | 
 | 		case ICMPV6_MGM_REPORT: | 
 | 			pstats->mstats.mld_v1reports[dir]++; | 
 | 			break; | 
 | 		case ICMPV6_MLD2_REPORT: | 
 | 			pstats->mstats.mld_v2reports[dir]++; | 
 | 			break; | 
 | 		case ICMPV6_MGM_QUERY: | 
 | 			if (t_len != sizeof(struct mld_msg)) | 
 | 				pstats->mstats.mld_v2queries[dir]++; | 
 | 			else | 
 | 				pstats->mstats.mld_v1queries[dir]++; | 
 | 			break; | 
 | 		case ICMPV6_MGM_REDUCTION: | 
 | 			pstats->mstats.mld_leaves[dir]++; | 
 | 			break; | 
 | 		} | 
 | 		break; | 
 | #endif /* CONFIG_IPV6 */ | 
 | 	} | 
 | 	u64_stats_update_end(&pstats->syncp); | 
 | } | 
 |  | 
 | void br_multicast_count(struct net_bridge *br, | 
 | 			const struct net_bridge_port *p, | 
 | 			const struct sk_buff *skb, u8 type, u8 dir) | 
 | { | 
 | 	struct bridge_mcast_stats __percpu *stats; | 
 |  | 
 | 	/* if multicast_disabled is true then igmp type can't be set */ | 
 | 	if (!type || !br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED)) | 
 | 		return; | 
 |  | 
 | 	if (p) | 
 | 		stats = p->mcast_stats; | 
 | 	else | 
 | 		stats = br->mcast_stats; | 
 | 	if (WARN_ON(!stats)) | 
 | 		return; | 
 |  | 
 | 	br_mcast_stats_add(stats, skb, type, dir); | 
 | } | 
 |  | 
 | int br_multicast_init_stats(struct net_bridge *br) | 
 | { | 
 | 	br->mcast_stats = netdev_alloc_pcpu_stats(struct bridge_mcast_stats); | 
 | 	if (!br->mcast_stats) | 
 | 		return -ENOMEM; | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | void br_multicast_uninit_stats(struct net_bridge *br) | 
 | { | 
 | 	free_percpu(br->mcast_stats); | 
 | } | 
 |  | 
 | /* noinline for https://llvm.org/pr45802#c9 */ | 
 | static noinline_for_stack void mcast_stats_add_dir(u64 *dst, u64 *src) | 
 | { | 
 | 	dst[BR_MCAST_DIR_RX] += src[BR_MCAST_DIR_RX]; | 
 | 	dst[BR_MCAST_DIR_TX] += src[BR_MCAST_DIR_TX]; | 
 | } | 
 |  | 
 | void br_multicast_get_stats(const struct net_bridge *br, | 
 | 			    const struct net_bridge_port *p, | 
 | 			    struct br_mcast_stats *dest) | 
 | { | 
 | 	struct bridge_mcast_stats __percpu *stats; | 
 | 	struct br_mcast_stats tdst; | 
 | 	int i; | 
 |  | 
 | 	memset(dest, 0, sizeof(*dest)); | 
 | 	if (p) | 
 | 		stats = p->mcast_stats; | 
 | 	else | 
 | 		stats = br->mcast_stats; | 
 | 	if (WARN_ON(!stats)) | 
 | 		return; | 
 |  | 
 | 	memset(&tdst, 0, sizeof(tdst)); | 
 | 	for_each_possible_cpu(i) { | 
 | 		struct bridge_mcast_stats *cpu_stats = per_cpu_ptr(stats, i); | 
 | 		struct br_mcast_stats temp; | 
 | 		unsigned int start; | 
 |  | 
 | 		do { | 
 | 			start = u64_stats_fetch_begin(&cpu_stats->syncp); | 
 | 			memcpy(&temp, &cpu_stats->mstats, sizeof(temp)); | 
 | 		} while (u64_stats_fetch_retry(&cpu_stats->syncp, start)); | 
 |  | 
 | 		mcast_stats_add_dir(tdst.igmp_v1queries, temp.igmp_v1queries); | 
 | 		mcast_stats_add_dir(tdst.igmp_v2queries, temp.igmp_v2queries); | 
 | 		mcast_stats_add_dir(tdst.igmp_v3queries, temp.igmp_v3queries); | 
 | 		mcast_stats_add_dir(tdst.igmp_leaves, temp.igmp_leaves); | 
 | 		mcast_stats_add_dir(tdst.igmp_v1reports, temp.igmp_v1reports); | 
 | 		mcast_stats_add_dir(tdst.igmp_v2reports, temp.igmp_v2reports); | 
 | 		mcast_stats_add_dir(tdst.igmp_v3reports, temp.igmp_v3reports); | 
 | 		tdst.igmp_parse_errors += temp.igmp_parse_errors; | 
 |  | 
 | 		mcast_stats_add_dir(tdst.mld_v1queries, temp.mld_v1queries); | 
 | 		mcast_stats_add_dir(tdst.mld_v2queries, temp.mld_v2queries); | 
 | 		mcast_stats_add_dir(tdst.mld_leaves, temp.mld_leaves); | 
 | 		mcast_stats_add_dir(tdst.mld_v1reports, temp.mld_v1reports); | 
 | 		mcast_stats_add_dir(tdst.mld_v2reports, temp.mld_v2reports); | 
 | 		tdst.mld_parse_errors += temp.mld_parse_errors; | 
 | 	} | 
 | 	memcpy(dest, &tdst, sizeof(*dest)); | 
 | } | 
 |  | 
 | int br_mdb_hash_init(struct net_bridge *br) | 
 | { | 
 | 	int err; | 
 |  | 
 | 	err = rhashtable_init(&br->sg_port_tbl, &br_sg_port_rht_params); | 
 | 	if (err) | 
 | 		return err; | 
 |  | 
 | 	err = rhashtable_init(&br->mdb_hash_tbl, &br_mdb_rht_params); | 
 | 	if (err) { | 
 | 		rhashtable_destroy(&br->sg_port_tbl); | 
 | 		return err; | 
 | 	} | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | void br_mdb_hash_fini(struct net_bridge *br) | 
 | { | 
 | 	rhashtable_destroy(&br->sg_port_tbl); | 
 | 	rhashtable_destroy(&br->mdb_hash_tbl); | 
 | } |